共 50 条
- [2] Inside the Insider Threat (Introduction) PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2637 - 2637
- [3] Inside the Insider Threat (Introduction) PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
- [4] Introduction to Inside the Insider Threat Minitrack PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3200 - 3201
- [5] Introduction to the inside the insider threat Minitrack Proceedings of the Annual Hawaii International Conference on System Sciences, 2016, 2016-March
- [6] Introduction to Insider Threat Modeling, Detection, and Mitigation Track PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1812 - 1812
- [8] Introduction to insider threat modeling, detection, and mitigation track Proceedings of the Annual Hawaii International Conference on System Sciences, 2012,
- [9] Introduction to the special issue on insider threat modeling and simulation Computational and Mathematical Organization Theory, 2016, 22 : 261 - 272
- [10] Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication 46TH ANNUAL 2012 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 2012, : 147 - 153