Login / Signup

Aspectising honeytokens to contain the insider threat.

Keshnee Padayachee
Published in: IET Inf. Secur. (2015)
Keyphrases
  • insider threat
  • email
  • security architecture
  • data streams
  • critical infrastructure
  • data leakage prevention
  • databases
  • social networks
  • data analysis
  • high speed
  • computer systems
  • privacy preserving