Login / Signup
An agent-based approach to modeling insider threat.
John A. Sokolowski
Catherine M. Banks
Thomas J. Dover
Published in:
Comput. Math. Organ. Theory (2016)
Keyphrases
</>
insider threat
data analysis
computational intelligence
data processing
security architecture