|
Volumn 2006, Issue , 2006, Pages 790-791
|
Applying role based access control and genetic algorithms to insider threat detection
|
Author keywords
[No Author keywords available]
|
Indexed keywords
MAPPING RULES;
SECURITY POLICIES;
THREAT DETECTION;
GENETIC ALGORITHMS;
SECURITY SYSTEMS;
SOCIETIES AND INSTITUTIONS;
USER INTERFACES;
ACCESS CONTROL;
|
EID: 34248344588
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1185448.1185638 Document Type: Conference Paper |
Times cited : (28)
|
References (6)
|