Login / Signup
Where Can an Insider Attack?
Christian W. Probst
René Rydhof Hansen
Flemming Nielson
Published in:
Formal Aspects in Security and Trust (2006)
Keyphrases
</>
countermeasures
malicious users
information systems
sensitive data
databases
secret key
neural network
data mining
genetic algorithm
case study
evolutionary algorithm
denial of service attacks