Sign in

Insider Threat Prediction Tool: Evaluating the probability of IT misuse.

George MagklarasSteven Furnell
Published in: Comput. Secur. (2002)
Keyphrases
  • insider threat
  • data mining
  • data processing
  • database applications