Login / Signup

Toward an Insider Threat Detection Framework Using Honey Permissions.

Parisa KaghazgaranHassan Takabi
Published in: J. Internet Serv. Inf. Secur. (2015)
Keyphrases
  • database
  • real time
  • information systems
  • insider threat