Login / Signup

An agent-based approach to modeling insider threat.

John A. SokolowskiCatherine M. BanksThomas J. Dover
Published in: Comput. Math. Organ. Theory (2016)
Keyphrases
  • insider threat
  • data analysis
  • computational intelligence
  • data processing
  • security architecture