Login / Signup
Frontiers in Insider Threats and Data Leakage Prevention.
Yoshiaki Hori
William R. Claycomb
Kangbin Yim
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
</>
insider threat
data leakage prevention
email
security architecture
data streams
data sets
access control
critical infrastructure
computer systems
operating system