Insider threat mitigation: preventing unauthorized knowledge acquisition.
Qussai YaseenBrajendra PandaPublished in: Int. J. Inf. Sec. (2012)
Keyphrases
- knowledge acquisition
- insider threat
- security architecture
- data leakage prevention
- data streams
- knowledge representation
- expert systems
- machine learning
- knowledge base
- risk management
- real time
- critical infrastructure
- data protection
- database systems
- database
- high speed
- decision making
- sensitive data
- artificial intelligence