Sign in

Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat.

Sonali ChandelYu SunYitian TangZhili ZhouYusheng Huang
Published in: CyberC (2019)
Keyphrases
  • security architecture
  • insider threat
  • data mining
  • information security
  • critical infrastructure
  • email