共 19 条
[1]
Carley KM(2002)Smart agents and organizations of the future Handb New Media 12 206-220
[2]
Cohen F(1999)Simulating cyber attacks, defences, and consequences Comput Secur 18 479-518
[3]
Contractor NS(2011)Multidimensional networks and the dynamics of sociomateriality: bringing technology inside the network Int J Commun 5 682-720
[4]
Monge PR(2009)Building a system for insider security IEEE Secur Priv 6 30-38
[5]
Leonardi PM(2006)Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach Decis Support Syst 41 592-603
[6]
Duran F(2008)A behavioral theory of insider-threat risks: a system dynamics approach ACM Trans Model Comput Simul 18 7:1-7:27
[7]
Conrad SH(undefined)undefined undefined undefined undefined-undefined
[8]
Conrad GN(undefined)undefined undefined undefined undefined-undefined
[9]
Duggan DP(undefined)undefined undefined undefined undefined-undefined
[10]
Held EB(undefined)undefined undefined undefined undefined-undefined