Login / Signup
Identifying threats in a large company's inbox.
Luigi Gallo
Alessio Botta
Giorgio Ventre
Published in:
Big-DAMA@CoNEXT (2019)
Keyphrases
</>
email
artificial intelligence
information systems
databases
case study
insider attacks