Detecting Insider Threats in Software Systems using Graph Models of Behavior Paths Download pdf Tags: Graph Models insider attacks Insider Threats User Behaviors HotSoS 2015 Poster Academia Posters License: CC-2.5 Submitted by Juergen Pfeffer on Wed, 05/06/2015 - 10:59