Detecting Masquerading Traitors from Process Visualization of Computer Usage | IEEE Conference Publication | IEEE Xplore