Login / Signup
Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats.
Ziqin Chen
Guanpu Chen
Yiguang Hong
Published in:
Unmanned Syst. (2024)
Keyphrases
</>
insider threat
insider attacks
email
security architecture
data streams
neural network
network security
critical infrastructure
intrusion detection
countermeasures
data mining
mobile devices