Secure Team Composition to Thwart Insider Threats and Cyber-Espionage.
Aron LaszkaBenjamin JohnsonPascal SchöttleJens GrossklagsRainer BöhmePublished in: ACM Trans. Internet Techn. (2014)
Keyphrases
- team composition
- cyber security
- security issues
- insider threat
- sensitive data
- security services
- security measures
- cyber crime
- security architecture
- information security
- cyber defense
- cyber attacks
- multi agent
- insider attacks
- security threats
- smart grid
- security mechanisms
- intrusion detection
- countermeasures
- computer security
- security management
- identity theft
- critical infrastructure
- security requirements
- network security
- lightweight
- security analysis
- security properties
- authentication protocol
- machine learning
- artificial intelligence