共 14 条
- [1] Coopers P., Turnaround and transformation in cyber security: key findings from the global state of information security survey 2016
- [2] 2016 global threat report
- [3] Cappelli D.M., Moore A.P., Trzeciak R.F., The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes, (2012)
- [4] Alahmadi B.A., Legg P.A., Nurse J.R.C., Using Internet activity profiling for insider-threat detection, International Workshop on Security in Information Systems, pp. 709-720, (2015)
- [5] Kammuller F., Probst C.W., Modeling and verification of insider threats using logical analysis, IEEE Systems Journal, 11, 2, pp. 534-545, (2017)
- [6] Huang T., Zhang F., Method of insider threat detection based on hidden Markov model, Computer Engineering and Design, 31, 5, pp. 965-968, (2010)
- [7] Eldardiry H., Bart E., Liu J., Et al., Multi-domain information fusion for insider threat detection, 2013 IEEE Symposium on Security and Privacy, pp. 45-51, (2013)
- [8] Messerman A., Mustafic T., Camtepe S.A., Et al., Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics, International Joint Conference on Biometrics, pp. 1-8, (2011)
- [9] Li Q.-G., Shi J.-Q., Qin Z.-G., Et al., Mining user behavior patterns for event detection in Email networks, Chinese Journal of Computers, 5, pp. 1135-1146, (2014)
- [10] Camina J.B., Hernandez-Gracidas C., Monroy R., Et al., The Windows-users and intruder simulations logs dataset (WUIL): an experimental framework for masquerade detection mechanisms, Expert Systems with Applications, 41, 3, pp. 919-930, (2014)