Login / Signup

Chronological Examination of Insider Threat Sabotage: Preliminary Observations.

William R. ClaycombCarly L. HuthLori FlynnDavid M. McIntireTodd B. Lewellen
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
  • insider threat
  • email
  • security architecture
  • databases
  • data streams
  • data sets
  • data leakage prevention