Counteracting Malicious Insider’s Activity within Funds Transfer Systems | IEEE Conference Publication | IEEE Xplore