共 50 条
- [41] Web application threat modeling and quantitative assessment Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2108-2112):
- [42] Assessment method for driving threat perception Guo, Z.-Z. (guozizheng@swjtu.edu.cn), 1600, Editorial Board of Jilin University (42):
- [43] An insider threat detection method based on improved Test-Time Training model High-Confidence Computing, 2025, 5 (01):
- [44] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
- [45] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512
- [46] Application of the threat modeling method in an operating system REVISTA DE GESTAO E SECRETARIADO-GESEC, 2023, 14 (04): : 5102 - 5122
- [47] Employee Performance Assessment with Profile Matching Method 2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 553 - 558
- [49] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model 2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,