|
Volumn 7, Issue 6, 2009, Pages 14-21
|
Detecting insider theft of trade secrets
|
Author keywords
Computer misuse; Computer security; Elicit; Exploit Latent Information to Counter Insider Threats; Insider threats; MITRE
|
Indexed keywords
COMPUTER MISUSE;
COMPUTER SECURITY;
INSIDER THREAT;
LATENT INFORMATION;
MALICIOUS INSIDERS;
RESEARCH EFFORTS;
RESEARCH PROTOTYPE;
SENSITIVE INFORMATIONS;
SOCIAL SCIENTISTS;
TRADE SECRETS;
ACCESS CONTROL;
NETWORK SECURITY;
RESEARCH;
SECURITY SYSTEMS;
|
EID: 75149124684
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2009.110 Document Type: Article |
Times cited : (49)
|
References (9)
|