共 50 条
- [21] Securing XML documents ADVANCES IN DATABSE TECHNOLOGY-EDBT 2000, PROCEEDINGS, 2000, 1777 : 121 - 135
- [22] Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation PROCEEDINGS OF THE 2008 14TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 501 - +
- [23] SECURING WIRELESS COPROCESSORS FROM ATTACKS IN THE INTERNET OF THINGS CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 159 - 178
- [24] Complexity of Insider Attacks to Databases PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
- [26] Preventing Insider Attacks in the Cloud ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
- [27] Securing Web servers against insider attack 17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 265 - 276
- [28] Insider attacks: human-factors attacks and mitigation Computer Fraud and Security, 2021, 2021 (05): : 14 - 17
- [30] Detecting insider attacks in medical cyber-physical networks based on behavioral profiling FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1258 - 1266