Login / Signup

Frontiers in Insider Threats and Data Leakage Prevention.

Yoshiaki HoriWilliam R. ClaycombKangbin Yim
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
  • insider threat
  • data leakage prevention
  • email
  • security architecture
  • data streams
  • data sets
  • access control
  • critical infrastructure
  • computer systems
  • operating system