共 50 条
- [21] Insider Threat Likelihood Assessment for Flexible Access Control E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
- [22] Insider Threat Event Detection in User-System Interactions PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 1 - 12
- [23] Insider threat analysis using information-centric modeling ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 55 - +
- [24] A Vector Relational Data Modeling approach to Insider Threat intelligence GROUND/AIR MULTISENSOR INTEROPERABILITY, INTEGRATION, AND NETWORKING FOR PERSISTENT ISR VII, 2016, 9831
- [26] An insider threat detection method based on business process mining International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
- [27] An Insider Threat Investigation Method by Graph Analysis with Log Texts PROCEEDINGS OF THE 2024 3RD INTERNATIONAL CONFERENCE ON NETWORKS, COMMUNICATIONS AND INFORMATION TECHNOLOGY, CNCIT 2024, 2024, : 19 - 23
- [28] An Insider Threat Detection Method Based on User Behavior Analysis INTELLIGENT INFORMATION PROCESSING IX, 2018, 538 : 421 - 429
- [30] Full-featured information equalization modeling for insider threat detection Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784