共 94 条
[81]
Wanyonyi E. N., 2023, Int. J. Netw. Secur. Appl, V15, P37
[82]
Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation
[J].
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION,
2021, 38
[83]
Wise D., 1988, The Spy Who Got Away: The Inside Story of Edward Lee Howard,the CIA Agent Who Betrayed His Country's Secrets and Escaped toMoscow, V1st
[84]
Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network
[J].
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
2023, 20 (03)
:3717-3733
[85]
Xiaoshuang Sun, 2021, 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), P749, DOI 10.1109/CISCE52179.2021.9445898
[87]
A Simulation-Based Approach to Development of a New Insider Threat Detection Technique: Active Indicators
[J].
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, AHFE 2018,
2019, 782
:3-14
[88]
Yousef M., 2023, INT C SMART APPL COM, P1
[89]
Few-shot Insider Threat Detection
[J].
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT,
2020,
:2289-2292
[90]
Zhang S., 2021, Secur. Commun. Netw., P1