Login / Signup

Defining the insider threat.

Matt BishopCarrie Gates
Published in: CSIIRW (2008)
Keyphrases
  • insider threat
  • email
  • security architecture
  • data streams
  • data leakage prevention
  • real time
  • data mining
  • wireless sensor networks
  • critical infrastructure