Mining Anomalous Usage of Sensitive Data through Anomaly Detection | IEEE Conference Publication | IEEE Xplore