Login / Signup
Adversarial Training for Robust Insider Threat Detection.
R. G. Gayathri
Atul Sajjanhar
Yong Xiang
Published in:
IJCNN (2022)
Keyphrases
</>
insider threat
data sets
real time
access control
anomaly detection
security architecture