Login / Signup

Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats.

Ziqin ChenGuanpu ChenYiguang Hong
Published in: Unmanned Syst. (2024)
Keyphrases
  • insider threat
  • insider attacks
  • email
  • security architecture
  • data streams
  • neural network
  • network security
  • critical infrastructure
  • intrusion detection
  • countermeasures
  • data mining
  • mobile devices