共 50 条
- [31] Developing an insider threat model using functional decomposition COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 412 - 417
- [32] Reflections on the insider threat INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
- [33] Insider Threat Detection Using Machine Learning Approach APPLIED SCIENCES-BASEL, 2023, 13 (01):
- [34] Insider Threat Detection using Virtual Machine Introspection PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1821 - 1830
- [35] Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques Computational and Mathematical Organization Theory, 2022, 28 : 335 - 351
- [37] Full-featured information equalization modeling for insider threat detection Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2019, 53 (04): : 777 - 784
- [38] Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model 2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
- [40] Insider Threat Data Expansion Research using Hyperledger Fabric 2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22), 2022, : 25 - 28