Login / Signup
Detecting and Rectifying the Non-Malicious Insider Threat in a Healthcare Setting.
Humayun Zafar
Published in:
Int. J. Syst. Softw. Secur. Prot. (2022)
Keyphrases
</>
insider threat
malicious activities
insider attacks
email
security architecture
intrusion detection system
data leakage prevention
online social networks
identity theft
data streams
critical infrastructure
information systems
real time
information technology
security policies