Login / Signup

Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.

Aron LaszkaBenjamin JohnsonPascal SchöttleJens GrossklagsRainer Böhme
Published in: ESORICS (2013)
Keyphrases
  • insider threat
  • countermeasures
  • link structure
  • security issues
  • denial of service attacks
  • insider attacks
  • information security
  • risk management
  • database systems
  • data streams
  • ranking algorithm
  • malicious attacks