ISI   2004 NSF/NIJ Symposium on Intelligence and Security Informatics
Wall of Fame | Most Viewed ISI-2004 Paper
11 years 10 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source271
2Download preprint from source255
3Download preprint from source228
4Download preprint from source160
5Download preprint from source155
6Download preprint from source147
7Download preprint from source144
8Download preprint from source132
9Download preprint from source132
10Download preprint from source129
11Download preprint from source121
12Download preprint from source116
13Download preprint from source114
14Download preprint from source106
15Download preprint from source97
16Download preprint from source95