Login / Signup

Identifying Insider Cyber Threats Using Behaviour Modelling and Analysis.

Tej AkashAlaka JayanNimit GaurSaddikuti Vishnu Vardhan ReddyManjith B. C.
Published in: OCIT (2023)
Keyphrases
  • static analysis
  • multiscale
  • database
  • machine learning
  • social networks
  • information systems
  • knowledge base