Login / Signup

An insider threat activity in a software security course.

Daniel E. KrutzAndrew MeneelySamuel A. Malachowsky
Published in: FIE (2015)
Keyphrases
  • insider threat
  • email
  • human activities
  • security architecture
  • information systems
  • data leakage prevention
  • database
  • databases
  • multi agent systems
  • data collection
  • computer systems