共 50 条
- [1] Redefining insider threats: a distinction between insider hazards and insider threats [J]. Security Journal, 2021, 34 : 755 - 775
- [4] Identifying Indicators of Insider Threats: Insider IT Sabotage [J]. 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
- [5] Securing Services in the Cloud: An Investigation of the Threats and the Mitigations [J]. DEFENSE TRANSFORMATION AND NET-CENTRIC SYSTEMS 2012, 2012, 8405
- [6] Social engineering and Insider threats [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 25 - 34
- [7] A primer on insider threats in cybersecurity [J]. INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
- [8] Isabelle Modelchecking for Insider Threats [J]. DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 196 - 210
- [9] Modelling of Enterprise Insider Threats [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
- [10] Identifying and Mitigating Insider Threats [J]. IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206