Login / Signup
Aspectising honeytokens to contain the insider threat.
Keshnee Padayachee
Published in:
IET Inf. Secur. (2015)
Keyphrases
</>
insider threat
email
security architecture
data streams
critical infrastructure
data leakage prevention
databases
social networks
data analysis
high speed
computer systems
privacy preserving