Return to Article Details Assessment of insider attack with learning statistics methods Download Download PDF