共 25 条
[1]
Aggarwal C., 2013, P ACM SIGKDD WORKSH
[2]
Aggarwal C. C., 2015, Data mining, P237
[3]
Akoglu Leman., 2013, ICWSM, P2
[4]
Bowen B., 2010, INSIDER THREATS CYBE
[5]
Brdiczka O., 2012, SPW 12 P 2012 IEEE S, DOI [10.1109/SPW.2012.29, DOI 10.1109/SPW.2012.29]
[6]
Cappelli Dawn, 2012, The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
[8]
Multi-Domain Information Fusion for Insider Threat Detection
[J].
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013),
2013,
:45-51
[9]
Gavai G., 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, V6, DOI DOI 10.22667/JOWUA.2015.12.31.047
[10]
Bridging the Gap: A Pragmatic Approach to Generating Insider Threat Data
[J].
IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013),
2013,
:98-104