Login / Signup
Designing Host and Network Sensors to Mitigate the Insider Threat.
Brian M. Bowen
Malek Ben Salem
Shlomo Hershkop
Angelos D. Keromytis
Salvatore J. Stolfo
Published in:
IEEE Secur. Priv. (2009)
Keyphrases
</>
insider threat
critical infrastructure
database
social networks
email
control system
network traffic
real time
wireless sensor networks
decision support system
data acquisition
complex networks
communication networks
network management