共 50 条
- [21] INTEGRATED SYSTEMS APPROACH TO MEET THE INSIDER THREAT. Nuclear materials management, 1985, 14 (03): : 628 - 632
- [22] Insider threat detection within embedded weapon systems 3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 163 - +
- [23] Predicting Insider Threat Risks through Linguistic Analysis of Electronic Communication PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1849 - 1858
- [24] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions 2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
- [28] Integrating constraint and relational database systems CONSTRAINT DATABASES, PROCEEDINGS, 2004, 3074 : 173 - 180
- [29] Reflections on the insider threat INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15