Login / Signup
An insider threat activity in a software security course.
Daniel E. Krutz
Andrew Meneely
Samuel A. Malachowsky
Published in:
FIE (2015)
Keyphrases
</>
insider threat
email
human activities
security architecture
information systems
data leakage prevention
database
databases
multi agent systems
data collection
computer systems