Toward Pinpointing Data Leakage from Advanced Persistent Threats.
Jack D'AgostinoGökhan KulPublished in: BigDataSecurity (2021)
Keyphrases
- data sets
- data points
- data processing
- high quality
- image data
- training data
- data analysis
- high dimensional
- data sources
- end users
- data distribution
- synthetic data
- original data
- high dimensional data
- computer systems
- data collection
- neural network
- data mining techniques
- small number
- knowledge discovery
- decision trees
- data structure
- missing data
- sensor data
- spatial data
- raw data
- data mining
- historical data