Login / Signup
A Structured Control Selection Methodology for Insider Threat Mitigation.
Puloma Roy
Anirban Sengupta
Chandan Mazumdar
Published in:
CENTERIS/ProjMAN/HCist (2020)
Keyphrases
</>
insider threat
control system
databases
data mining
computer systems
mobile agents
data acquisition