Lecture6-Logistic regression with examples.pdf Lecture2-3-CIAin Cyber security with details.ppt Lecture7-8-Network Protocls attack in cyber.ppt SQL_Injection.ppt for insider threats detection insider-threat.ppt detection for database security Preprocessing techniques in data mining with solve examples