Login / Signup

Mitigating exploits, rootkits and advanced persistent threats.

David Durham
Published in: Hot Chips Symposium (2014)
Keyphrases
  • bayesian networks
  • risk management
  • information retrieval
  • information systems
  • countermeasures
  • insider threat
  • real time
  • data sets
  • learning algorithm
  • artificial intelligence
  • cloud computing
  • insider attacks