Login / Signup
A Theoretical Underpinning for Examining Insider Attacks Leveraging the Fraud Pentagon.
Keshnee Padayachee
Published in:
HAISA (2021)
Keyphrases
</>
insider attacks
insider threat
attack detection
fraud detection
early detection
data mining techniques
databases
email
anomaly detection
cryptographic protocols
customer data
protocol stack