Login / Signup
Introduction to the special issue on insider threats in cybersecurity.
Adéle da Veiga
Steven Furnell
Yuxiang Hong
Merrill Warkentin
Published in:
J. Inf. Secur. Appl. (2023)
Keyphrases
</>
insider threat
insider attacks
countermeasures
email
critical infrastructure
information security
denial of service attacks
data sets
database
decision trees
machine learning and data mining
security architecture
malicious attacks
telecommunication systems