Login / Signup

A Structured Control Selection Methodology for Insider Threat Mitigation.

Puloma RoyAnirban SenguptaChandan Mazumdar
Published in: CENTERIS/ProjMAN/HCist (2020)
Keyphrases
  • insider threat
  • control system
  • databases
  • data mining
  • computer systems
  • mobile agents
  • data acquisition