共 50 条
[21]
Insider Threat Detection using an Artificial Immune system Algorithm
[J].
2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON),
2018,
:297-302
[23]
Insider Threat Data Expansion Research using Hyperledger Fabric
[J].
2022 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON22),
2022,
:25-28
[24]
Using dynamic models to support inferences of insider threat risk
[J].
Computational and Mathematical Organization Theory,
2016, 22
:350-381
[25]
The Insider Threat in Cloud Computing
[J].
CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011,
2013, 6983
:93-103
[27]
Intelligence Analyses and the Insider Threat
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2012, 42 (02)
:331-347
[29]
An Insider Threat Prediction Model
[J].
TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS,
2010, 6264
:26-37