Login / Signup
Insider Threat Defined: Discovering the Prototypical Case.
David A. Mundie
Samuel J. Perl
Carly Huth J. D.
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2014)
Keyphrases
</>
insider threat
data sets
database systems
data collection
computer systems