Login / Signup

Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration.

Clifford E. Kahn
Published in: Workshop on New Security Paradigms (1998)
Keyphrases
  • insider attacks
  • attack detection
  • multistage
  • insider threat
  • data streams
  • communication services