Login / Signup
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud.
Salvatore J. Stolfo
Malek Ben Salem
Angelos D. Keromytis
Published in:
IEEE Symposium on Security and Privacy Workshops (2012)
Keyphrases
</>
data sets
insider threat
data analysis
raw data
cloud computing
image data
synthetic data
high quality
data structure
end users
data processing
rfid tags
training data
data collection
computer systems
missing data
sensor data
data acquisition
database