Login / Signup

Detecting insider threats in software systems using graph models of behavioral paths.

Hemank LambaThomas J. GlazierBradley R. SchmerlJürgen PfefferDavid Garlan
Published in: HotSoS (2015)
Keyphrases