no code implementations • 13 Nov 2019 • Gayathri R G, Atul Sajjanhar, Yong Xiang
The insider threat analysis is mainly done using the frequency based attributes extracted from the raw data available from data sources.
Classification General Classification +1