共 49 条
- [3] [Anonymous], J MED SYST
- [4] [Anonymous], 2013, J. Med. Syst.
- [5] Anton S., 2015, P INT SCI C STRAT 21, P382
- [7] Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud [J]. ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 157 - 166
- [8] CERT Insider Threat Team, 2014, CMUSEI2014TN007
- [10] Costa D. L., 2016, Tech. Rep. CMU/SEI-2016-TR-007