共 50 条
- [31] Detecting Insider Attacks in Blockchain Networks [J]. 2021 International Symposium on Networks, Computers and Communications, ISNCC 2021, 2021,
- [32] A framework for understanding and predicting insider attacks [J]. COMPUTERS & SECURITY, 2002, 21 (06) : 526 - 531
- [34] Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 157 - 166
- [35] The Insider Threat in Cloud Computing [J]. CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
- [36] Klm-based Profiling and Preventing Security Attacks for Cloud Computing: A Comparative Study [J]. 2021 28TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2021, : 57 - 62
- [39] A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks [J]. INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 260 - 271
- [40] A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data [J]. 2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 111 - 116