Login / Signup

Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection.

Pamela CarvalloAna R. CavalliNatalia Kushik
Published in: ICSOFT (2017)
Keyphrases
  • insider threat
  • cloud computing
  • databases
  • data sets
  • email
  • computational intelligence
  • low cost