![]() |
Volumn 7, Issue 6, 2009, Pages 30-38
|
Building a system for insider security
|
Author keywords
And visualization; Applications; Computing methodologies.; Insider security; Insider security systems; Insider threat; Model development; Modeling; Modeling methodologies; Simulation; System dynamics modeling
|
Indexed keywords
COMPUTING METHODOLOGIES;
INSIDER THREAT;
MODEL DEVELOPMENT;
MODELING METHODOLOGY;
SIMULATION SYSTEMS;
VISUALIZATION APPLICATION;
PERSONNEL;
SECURITY SYSTEMS;
SYSTEM THEORY;
VISUALIZATION;
NETWORK SECURITY;
|
EID: 75149188648
PISSN: 15407993
EISSN: None
Source Type: Journal
DOI: 10.1109/MSP.2009.111 Document Type: Article |
Times cited : (21)
|
References (14)
|