Login / Signup
Modeling Interventions for Insider Threat.
Luke J. Osterritter
Kathleen M. Carley
Published in:
SBP-BRiMS (2020)
Keyphrases
</>
insider threat
data sets
information systems
email
client server
security architecture