Login / Signup
Implementing PII honeytokens to mitigate against the threat of malicous insiders.
Jonathan White
Brajendra Panda
Published in:
ISI (2009)
Keyphrases
</>
insider threat
countermeasures
data sets
genetic algorithm
real time
data mining
search engine
social networks
website
intrusion detection