Sign in

Adversarial Training for Robust Insider Threat Detection.

R. G. GayathriAtul SajjanharYong Xiang
Published in: IJCNN (2022)
Keyphrases
  • insider threat
  • data sets
  • real time
  • access control
  • anomaly detection
  • security architecture