Login / Signup
Malicious Users' Transactions: Tackling Insider Threat.
Weihan Li
Brajendra Panda
Qussai Yaseen
Published in:
SEC (2012)
Keyphrases
</>
malicious users
insider threat
email
security architecture
data leakage prevention
data streams
database
sensitive data
user privacy
data analysis