共 50 条
- [22] Detecting Insider Threats: Solutions and Trends INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192
- [23] Introduction to the Special Issue on Insider Threats DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
- [24] Model Based Analysis of Insider Threats 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
- [25] Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 344 - 349
- [27] Security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT) 2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
- [28] Towards Formal Analysis of Insider Threats for Auctions MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
- [29] Detecting and Preventing Cyber Insider Threats: A Survey IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
- [30] Understanding and countering insider threats in software development 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90