Login / Signup

Malicious Users' Transactions: Tackling Insider Threat.

Weihan LiBrajendra PandaQussai Yaseen
Published in: SEC (2012)
Keyphrases
  • malicious users
  • insider threat
  • email
  • security architecture
  • data leakage prevention
  • data streams
  • database
  • sensitive data
  • user privacy
  • data analysis