Login / Signup

Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles.

Kholood Al TabashJassim Happa
Published in: Comput. Secur. (2018)
Keyphrases
  • insider threat
  • sensitivity analysis
  • communication networks
  • security architecture
  • data mining
  • computational intelligence
  • sensitive information