A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications

Shuyuan Mary Ho, Hwajung Lee. A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications. JoWUA, 3(1/2):82-98, 2012. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.