共 50 条
- [42] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
- [43] Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier 2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 5034 - 5039
- [44] Insider Threat Program Best Practices PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
- [45] Cybercrime Countermeasure of Insider Threat Investigation 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
- [47] Weak models for insider threat detection SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
- [49] Modeling the emergence of insider threat vulnerabilities PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
- [50] Contrastive Learning for Insider Threat Detection DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403