共 30 条
[1]
Abomhara M., 2015, Journal of Cyber Security and Mobility, P65
[2]
Akinwumi D.A., 2017, Nigerian Journal of Technology, V36, P1271, DOI DOI 10.4314/NJT.V36I4.38
[3]
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
[J].
APPLIED SCIENCES-BASEL,
2020, 10 (15)
[7]
Accounting and Cybersecurity Risk Management
[J].
CURRENT ISSUES IN AUDITING,
2019, 13 (02)
:C1-C9
[8]
Elifoglu IH, 2018, REV BUS, V38, P61