Login / Signup

Mitigating Insider Threat on Database Integrity.

Weihan LiBrajendra PandaQussai Yaseen
Published in: ICISS (2012)
Keyphrases
  • database integrity
  • insider threat
  • integrity constraints
  • email
  • security architecture
  • risk management
  • data streams
  • critical infrastructure
  • data mining
  • risk analysis