Login / Signup
Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection.
Pamela Carvallo
Ana R. Cavalli
Natalia Kushik
Published in:
ICSOFT (2017)
Keyphrases
</>
insider threat
cloud computing
databases
data sets
email
computational intelligence
low cost