Login / Signup
Mitigating multi-threats optimally in proactive threat management.
Punam Bedi
Vandana Gandotra
Archana Singhal
Himanshi Narang
Sumit Sharma
Published in:
ACM SIGSOFT Softw. Eng. Notes (2013)
Keyphrases
</>
countermeasures
management system
information systems
decision making
information management
insider threat
knowledge management
data processing
decision support
information security
real time
data management
sir model