Login / Signup
Establishing forensics capabilities in the presence of superuser insider threats.
Bharat Manral
Gaurav Somani
Published in:
Digit. Investig. (2021)
Keyphrases
</>
insider threat
countermeasures
information systems
neural network
artificial intelligence
decision trees
information security
computational power
cyber security
critical infrastructure
denial of service attacks
insider attacks