Login / Signup
Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration.
Clifford E. Kahn
Published in:
Workshop on New Security Paradigms (1998)
Keyphrases
</>
insider attacks
attack detection
multistage
insider threat
data streams
communication services