Login / Signup
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques.
Jeffrey Hunker
Christian W. Probst
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2011)
Keyphrases
</>
insider threat
insider attacks
email
security architecture
data streams
critical infrastructure
real time
learning algorithm
information systems
database
intrusion detection
security policies
security model
future trends