search menu icon-carat-right cmu-wordmark

Posts by Emily Kessel

Benford's Law: Potential Applications for Insider Threat Detection

Benford's Law: Potential Applications for Insider Threat Detection

• Blog
Emily Kessel

Detecting anomalous network activity is a powerful way to discover insider threat activities. It is time consuming, however, to establish baseline traffic and process traffic data. This blog post explores how a mathematical law, already used in forensic accounting, may help detect insider activity without the effort of traditional anomaly detection....

Read More

Contact the Author

Emily Kessel