Login / Signup

Model based analysis of insider threats.

Taolue ChenTingting HanFlorian KammuellerIbrahim NemliChristian W. Probst
Published in: Cyber Security And Protection Of Digital Services (2016)
Keyphrases
  • evolutionary algorithm
  • data structure
  • data sets
  • databases
  • genetic algorithm
  • website
  • database systems
  • similarity measure
  • search algorithm