Login / Signup
Handling Insider Threat Through Supervised Machine Learning Techniques.
Faisal Janjua
Asif Masood
Haider Abbas
Imran Rashid
Published in:
EUSPN/ICTH (2020)
Keyphrases
</>
insider threat
email
security architecture
data leakage prevention
computational intelligence
data streams