Login / Signup
Software decoys for insider threat.
Young Hee Park
Salvatore J. Stolfo
Published in:
AsiaCCS (2012)
Keyphrases
</>
insider threat
software development
databases
email
computer systems
software systems
database systems
software architecture