共 50 条
[11]
Introduction to the special issue on insider threat modeling and simulation
[J].
Computational and Mathematical Organization Theory,
2016, 22
:261-272
[12]
An agent-based approach to modeling insider threat
[J].
Computational and Mathematical Organization Theory,
2016, 22
:273-287
[13]
Modelling of Enterprise Insider Threats
[J].
2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP),
2015,
:132-136
[14]
Insider Threat Detection Using Machine Learning Approach
[J].
APPLIED SCIENCES-BASEL,
2023, 13 (01)
[15]
Survival analysis for insider threatDetecting insider threat incidents using survival analysis techniques
[J].
Computational and Mathematical Organization Theory,
2022, 28
:335-351
[17]
Full-featured information equalization modeling for insider threat detection
[J].
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science),
2019, 53 (04)
:777-784
[18]
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model
[J].
2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS),
2019,
[20]
Understanding Insider Threat Attacks Using Natural Language Processing: Automatically Mapping Organic Narrative Reports to Existing Insider Threat Frameworks
[J].
HCI FOR CYBERSECURITY, PRIVACY AND TRUST, HCI-CPT 2020,
2020, 12210
:619-636