Login / Signup
Defense-in-Depth Against Malicious Insiders in the Cloud.
Francisco Rocha
Thomas Gross
Aad P. A. van Moorsel
Published in:
IC2E (2013)
Keyphrases
</>
cloud computing
insider threat
depth information
intrusion detection
depth map
neural network
data center
real time
data mining
open source
stereo vision
depth estimation
depth cues
computing infrastructure
advanced research projects agency