Login / Signup

Handling Insider Threat Through Supervised Machine Learning Techniques.

Faisal JanjuaAsif MasoodHaider AbbasImran Rashid
Published in: EUSPN/ICTH (2020)
Keyphrases
  • insider threat
  • email
  • security architecture
  • data leakage prevention
  • computational intelligence
  • data streams