Date: 2014-07-17 08:03:36Threat Insider Computing Data mining Georgia Tech Research Institute Cyber Insider Threat Insider trading Computer security Computer network security Cyberwarfare | | A critical reflection on the threat from human insiders – its nature, industry perceptions, and detection approaches Jason R.C. Nurse1 , Philip A. Legg1 , Oliver Buckley1 , Ioannis Agrafiotis1 , Gordon Wright2 , MonicaAdd to Reading ListSource URL: www.cs.ox.ac.ukDownload Document from Source Website File Size: 179,37 KBShare Document on Facebook
|