Login / Signup
Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Aron Laszka
Benjamin Johnson
Pascal Schöttle
Jens Grossklags
Rainer Böhme
Published in:
ESORICS (2013)
Keyphrases
</>
insider threat
countermeasures
link structure
security issues
denial of service attacks
insider attacks
information security
risk management
database systems
data streams
ranking algorithm
malicious attacks