Back to Results
First PageMeta Content
Computer network security / Cyberwarfare / Computer security / Salvatore J. Stolfo / Cryptography / Intrusion detection system / Decoy / Network security / Rootkit / Malware / Computer virus / Antivirus software


Insider Threats Designing Host and Network Sensors to Mitigate the Insider Threat Insider attacks—that is, attacks by users with privileged
Add to Reading List

Document Date: 2011-09-04 10:44:35


Open Document

File Size: 1,03 MB

Share Result on Facebook