Login / Signup

A Bayesian approach to insider threat detection.

Alexander WallsIoannis Agrafiotis
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2021)
Keyphrases
  • insider threat
  • data streams
  • email
  • security architecture
  • real time
  • data sets
  • data analysis
  • anomaly detection
  • distributed databases