Login / Signup
Controlling insider threats with information security policies.
Ali Alper Yayla
Published in:
ECIS (2011)
Keyphrases
</>
security policies
real world
machine learning
distributed systems
intelligent agents
information security
sensitive information