Login / Signup

Identifying and Mitigating Insider Threats.

Christian W. Probst
Published in: it Inf. Technol. (2011)
Keyphrases
  • insider threat
  • risk management
  • machine learning
  • learning algorithm
  • data streams
  • email
  • web applications
  • information security
  • malicious attacks