共 50 条
- [41] Using Dirichlet Marked Hawkes Processes for Insider Threat Detection DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
- [42] Using dynamic models to support inferences of insider threat risk Computational and Mathematical Organization Theory, 2016, 22 : 350 - 381
- [43] DANTE: Predicting Insider Threat using LSTM on system logs 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1152 - 1157
- [44] Insider Threat Detection using an Artificial Immune system Algorithm 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 297 - 302
- [47] The Insider Threat in Cloud Computing CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
- [48] Software Decoys for Insider Threat 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
- [49] Insider Threat Detection: A Review 2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
- [50] Inside the Insider Threat (Introduction) PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2637 - 2637