Sign in

Implementing insider defenses.

Eric GrosseFred B. SchneiderLynette I. Millett
Published in: Commun. ACM (2021)
Keyphrases
  • network security
  • database
  • real time
  • data mining
  • computer vision
  • data structure
  • machine learning systems