共 10 条
[1]
Agrafiotis I, 2015, COMPUT FRAUD SECUR, P9
[2]
[Anonymous], 2012, C PROTECTION NATL IN
[3]
Cappelli D. M., 2012, CERT GUID INSIDER TH
[4]
Crampton J., 2009, P 5 INT WORKSH SEC T
[5]
Invalidating Policies using Structural Information
[J].
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013),
2013,
:76-81
[6]
Legg P. A., 2015, AUTOMATED INSIDER TH
[7]
Magklaras G, 2010, ADV INFORM SECUR, V49, P219, DOI 10.1007/978-1-4419-7133-3_10
[8]
Understanding Insider Threat: A Framework for Characterising Attacks
[J].
2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014),
2014,
:214-228
[9]
Poll H., 2015, VORMETRIC INSIDER TH
[10]
Taolue Chen, 2015, Human Aspects of Information Security, Privacy and Trust. Third International Conference, HAS 2015, held as part of HCI International 2015. Proceedings: LNCS 9190, P178, DOI 10.1007/978-3-319-20376-8_16