Login / Signup
Mitigating Insider Threat on Database Integrity.
Weihan Li
Brajendra Panda
Qussai Yaseen
Published in:
ICISS (2012)
Keyphrases
</>
database integrity
insider threat
integrity constraints
email
security architecture
risk management
data streams
critical infrastructure
data mining
risk analysis