Login / Signup

A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon.

Keshnee Padayachee
Published in: HAISA (2021)
Keyphrases
  • insider attacks
  • insider threat
  • attack detection
  • fraud detection
  • early detection
  • data mining techniques
  • databases
  • email
  • anomaly detection
  • cryptographic protocols
  • customer data
  • protocol stack