共 50 条
[31]
Behavioral Based Insider Threat Detection Using Deep Learning
[J].
IEEE ACCESS,
2021, 9
:143266-143274
[32]
Supervised Learning for Insider Threat Detection Using Stream Mining
[J].
2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011),
2011,
:1032-1039
[34]
Insider Threat Mitigation Using Moving Target Defense and Deception
[J].
PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17),
2017,
:93-96
[35]
Insider Threat Detection in PRODIGAL
[J].
PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES,
2017,
:2648-2657
[36]
A Method of Evaluation for Insider Threat
[J].
2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014),
2014,
:438-441
[37]
Insider threat detection within embedded weapon systems
[J].
3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS,
2008,
:163-+
[38]
Cybercrime Countermeasure of Insider Threat Investigation
[J].
2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION,
2019,
:413-418
[39]
Weak models for insider threat detection
[J].
SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2,
2004, 5403
:40-48