Detecting Insider Threats in Software Systems using Graph Models of Behavior Paths

Namesort iconValue
MIME typeapplication/pdf
Size802.65 KB