共 50 条
- [22] Insider threat mitigation: preventing unauthorized knowledge acquisition International Journal of Information Security, 2012, 11 : 269 - 280
- [24] Modeling the emergence of insider threat vulnerabilities PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
- [25] AGENT IMPLEMENTATION FOR MODELING INSIDER THREAT 2015 WINTER SIMULATION CONFERENCE (WSC), 2015, : 266 - 275
- [26] Contrastive Learning for Insider Threat Detection DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2022, PT I, 2022, : 395 - 403
- [27] Weak models for insider threat detection SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
- [28] Review on Insider Threat Detection Techniques 3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
- [29] Insider Threat Detection and Cloud Computing ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
- [30] Analytics for early detection of insider threat SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122