Login / Signup
Defining the insider threat.
Matt Bishop
Carrie Gates
Published in:
CSIIRW (2008)
Keyphrases
</>
insider threat
email
security architecture
data streams
data leakage prevention
real time
data mining
wireless sensor networks
critical infrastructure