Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders - ICISS 2009.pdf

Research output: Contribution to journalArticlepeer-review

Original languageAmerican English
JournalSixth International Conference on Information Assurance
StatePublished - Aug 23 2010

Disciplines

  • Engineering
  • Computer Engineering

Cite this