Detecting insider threats by monitoring system call activity | IEEE Conference Publication | IEEE Xplore