共 50 条
- [21] Modelling of Enterprise Insider Threats 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
- [22] Identifying and Mitigating Insider Threats IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206
- [23] Towards a social network approach for monitoring insider threats to information security INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 501 - 507
- [25] Insider Threats in Information Security 2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113
- [27] Technologies in CyberSpace: A Context of Threats and Defenses IDENTIFICATION OF POTENTIAL TERRORISTS AND ADVERSARY PLANNING: EMERGING TECHNOLOGIES AND NEW COUNTER-TERROR STRATEGIES, 2017, 132 : 60 - 74
- [28] A risk-based framework to inform prioritisation of security investment for insider threats International Journal of Safety and Security Engineering, 2020, 10 (01): : 49 - 57
- [30] BTDetect: An Insider Threats Detection Approach Based on Behavior Traceability for IaaS Environments 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 344 - 351