Login / Signup
An Empirical Validation of Malicious Insider Characteristics.
Nan Peter Liang
David P. Biros
Andy Luse
Published in:
J. Manag. Inf. Syst. (2016)
Keyphrases
</>
empirical validation
empirically validated
real time
neural network
computer vision
databases
three dimensional
wireless sensor networks