Login / Signup

Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs.

Kara NanceRaffael Marty
Published in: HICSS (2011)
Keyphrases