Login / Signup
Identifying and Mitigating Insider Threats.
Christian W. Probst
Published in:
it Inf. Technol. (2011)
Keyphrases
</>
insider threat
risk management
machine learning
learning algorithm
data streams
email
web applications
information security
malicious attacks