Login / Signup

Agent implementation for modeling insider threat.

John A. SokolowskiCatherine M. Banks
Published in: WSC (2015)
Keyphrases
  • insider threat
  • multi agent systems
  • multi agent
  • software agents
  • multiagent systems
  • intelligent agents
  • low cost
  • information security
  • information systems
  • decision making
  • email