Login / Signup

Where Can an Insider Attack?

Christian W. ProbstRené Rydhof HansenFlemming Nielson
Published in: Formal Aspects in Security and Trust (2006)
Keyphrases
  • countermeasures
  • malicious users
  • information systems
  • sensitive data
  • databases
  • secret key
  • neural network
  • data mining
  • genetic algorithm
  • case study
  • evolutionary algorithm
  • denial of service attacks