Login / Signup

Composite Role-Based Monitoring (CRBM) for Countering Insider Threats.

Joon S. ParkShuyuan Mary Ho
Published in: ISI (2004)
Keyphrases
  • insider threat
  • monitoring system
  • access control
  • real time
  • computational properties
  • information security
  • early warning
  • database
  • decision support
  • expressive power
  • data acquisition
  • countermeasures