Login / Signup
Modeling the emergence of insider threat vulnerabilities.
Ignacio J. Martinez-Moyano
Eliot H. Rich
Stephen H. Conrad
David F. Andersen
Published in:
WSC (2006)
Keyphrases
</>
insider threat
databases
information security
object oriented
security issues
data leakage prevention