Search

Your search keyword '"Insider threat"' showing total 11 results

Search Constraints

Start Over You searched for: Descriptor "Insider threat" Remove constraint Descriptor: "Insider threat" Journal procedia computer science Remove constraint Journal: procedia computer science
11 results on '"Insider threat"'

Search Results

1. A Structured Control Selection Methodology for Insider Threat Mitigation.

2. Handling Insider Threat Through Supervised Machine Learning Techniques.

3. Improving Insider Threat Detection Through Multi-Modelling/Data Fusion.

4. A Structured Control Selection Methodology for Insider Threat Mitigation

5. Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud.

6. Improving Insider Threat Detection Through Multi-Modelling/Data Fusion

7. Design and Implementation of a Comprehensive Insider Threat Ontology

8. A Continuous Re-Authentication Approach Using Ensemble Learning.

9. Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

10. Insider Threat Detection Using Log Analysis and Event Correlation

11. A Continuous Re-Authentication Approach Using Ensemble Learning

Catalog

Books, media, physical & digital resources