Login / Signup
Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles.
Kholood Al Tabash
Jassim Happa
Published in:
Comput. Secur. (2018)
Keyphrases
</>
insider threat
sensitivity analysis
communication networks
security architecture
data mining
computational intelligence
sensitive information