Login / Signup
Unsupervised methods for detecting a malicious insider.
Matt Wolff
Published in:
ISCRAM (2010)
Keyphrases
</>
unsupervised methods
insider threat
semi supervised
data sets
supervised methods
multiscale
machine learning
training data
natural language
viewpoint
text mining
segmented images