Login / Signup
A Bayesian approach to insider threat detection.
Alexander Walls
Ioannis Agrafiotis
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2021)
Keyphrases
</>
insider threat
data streams
email
security architecture
real time
data sets
data analysis
anomaly detection
distributed databases