共 50 条
- [21] Algorithm of optimal security hardening measures against insider threat Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (07): : 1565 - 1577
- [22] Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY, AND TRUST, 2016, 9750 : 128 - 139
- [23] A Structured Approach to Insider Threat Monitoring for Offensive Security Teams 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
- [24] Mitigating Insider Threat: A Neural Network Approach for Enhanced Security IEEE ACCESS, 2024, 12 : 73752 - 73768
- [25] Enterprise Level Security: Insider Threat Counter-Claims WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 112 - 117
- [26] Information security insider threat visualization: Theft of intellectual property Scientific Visualization, 2015, 7 (03): : 53 - 68
- [27] Confronting Information Security's Elephant, the Unintentional Insider Threat AUGMENTED COGNITION. HUMAN COGNITION AND BEHAVIOR, AC 2020, PT II, 2020, 12197 : 316 - 334
- [28] Organizational Vulnerability to Insider Threat What Do Australian Experts Say? HCI INTERNATIONAL 2016 - POSTERS' EXTENDED ABSTRACTS, PT I, 2016, 617 : 465 - 470