Detecting Insider Threats in Software Systems using Graph Models of Behavior Paths
License:
Creative Commons 2.5 PDF document
- 802.65 KB
- 35 downloads
- Download
- PDF version
- Printer-friendly version