Login / Signup
Mitigating exploits, rootkits and advanced persistent threats.
David Durham
Published in:
Hot Chips Symposium (2014)
Keyphrases
</>
bayesian networks
risk management
information retrieval
information systems
countermeasures
insider threat
real time
data sets
learning algorithm
artificial intelligence
cloud computing
insider attacks