共 24 条
[1]
Common Sense Guide to Mitigating Insider Threats, (2016)
[2]
Schultz E.E., A framework for understanding and predicting insider attacks, Comput Secur, 21, 6, pp. 526-531, (2002)
[3]
Magklaras G.B., Furnell S.M., A preliminary model of end user sophistication for insider threat prediction in IT systems, Comput Secur, 24, 5, pp. 371-380, (2005)
[4]
Legg P., Moffat N., Nurse J.R.C., Happa J., Agrafiotis I., Goldsmith M., Creese S., Towards a conceptual model and reasoning structure for insider threat detection, J Wirel Mob Netw Ubiquitous Comput Dependable Appl, 4, 4, pp. 20-37, (2013)
[5]
Nurse J.R.C., Buckley O., Legg P., Goldsmith M., Creese S., Wright G.R.T., Whitty M., Understanding insider threat: a framework for characterising attacks. IEEE security and privacy workshops (SPW), San Jose, CA, IEEE, pp. 214-228, (2014)
[6]
Greitzer F.L., Kangas L.J., Noonan C.F., Brown C.R., Ferryman T., Psychosocial modeling of insider threat risk based on behavioral and word use analysis, E-Service J, 9, 1, pp. 106-138, (2014)
[7]
Greitzer F.L., Purl J., Leong Y.M., Becker D.E., SOFIT: sociotechnical and organizational factors for insider threat, 2018 IEEE security and privacy workshops
[8]
Greitzer F.L., Purl J., Becker D.E., Sticha P., Leong Y.M., Modeling expert judgments of insider threat using ontology structure: effects of individual indicator threat value and class membership, 52nd Hawaii international conference on systems sciences (HICSS-52), pp. 3202-3211, (2019)
[9]
Senator T.E., Et al., Detecting insider threats in a real corporate database of computer usage activity. Proceedings of the 19th ACM SIGKDD conference on knowledge discovery and data mining, Aug 11–14, Chicago, IL, pp. 1393-1401, (2013)
[10]
Buede D.M., Axelrad E.T., Brown D.P., Hudson D.W., Laskey K.B., Sticha P.J., Thomas J.L., Inference enterprise models: An approach to organizational performance improvement, Wiley Interdiscip Rev Data Min Knowl Discov, 8, 6, (2018)