Sign in

The Insider Threat: Reasons, Effects and Mitigation Techniques.

Dimitrios TsiostasGeorge KittesNestoras ChouliarasIoanna KantzavelouLeandros A. MaglarasChristos DouligerisVasileios Vlachos
Published in: PCI (2020)
Keyphrases
  • insider threat
  • email
  • security architecture
  • data leakage prevention
  • data mining
  • data processing