Understanding insider threat attacks using natural language processing: automatically mapping organic narrative reports to existing insider threat frameworks

Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

© Cranfield University, 2015. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright holder. Except where otherwise noted, this item's license is described as © Cranfield University, 2015. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright holder.

Search CERES


Browse

My Account

Statistics