Login / Signup
Model based analysis of insider threats.
Taolue Chen
Tingting Han
Florian Kammueller
Ibrahim Nemli
Christian W. Probst
Published in:
Cyber Security And Protection Of Digital Services (2016)
Keyphrases
</>
evolutionary algorithm
data structure
data sets
databases
genetic algorithm
website
database systems
similarity measure
search algorithm