Login / Signup
Addressing insider attacks via forensic-ready risk management.
Lukas Daubner
Martin Macák
Raimundas Matulevicius
Barbora Buhnova
Sofija Maksovic
Tomás Pitner
Published in:
J. Inf. Secur. Appl. (2023)
Keyphrases
</>
risk management
insider attacks
decision support system
attack detection
risk assessment
risk analysis
early detection
insider threat
project management
cryptographic protocols
customer data
multistage
risk factors
software projects
decision makers
wireless sensor networks
computer systems