Login / Signup
Chronological Examination of Insider Threat Sabotage: Preliminary Observations.
William R. Claycomb
Carly L. Huth
Lori Flynn
David M. McIntire
Todd B. Lewellen
Published in:
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
</>
insider threat
email
security architecture
databases
data streams
data sets
data leakage prevention