Login / Signup

Insider Threat Defined: Discovering the Prototypical Case.

David A. MundieSamuel J. PerlCarly Huth J. D.
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2014)
Keyphrases
  • insider threat
  • data sets
  • database systems
  • data collection
  • computer systems