Insider threats in information security categories and approaches.
Nebrase ElmrabitShuang-Hua YangLili YangPublished in: ICAC (2015)
Keyphrases
- information security
- countermeasures
- information systems
- security issues
- smart card
- sensitive data
- intrusion detection
- network security
- security requirements
- computer security
- security level
- information assurance
- risk assessment
- information security management
- smart grid
- data security
- cyber defense
- e government
- active learning
- object recognition
- case study
- e learning