共 50 条
- [1] Algorithm for sensing insider threat based on cloud model Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 784 - 792
- [2] Detecting Insider Threat Based on Document Access Behavior Analysis WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 376 - 387
- [3] Mapping Social Media Insider Threat Attack Vectors PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1840 - 1848
- [4] An Access Abstraction Model for Mitigating the Insider Threat ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
- [5] Memory Access Pattern based Insider Threat Detection in Big Data Systems 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3625 - 3628
- [6] An ontological approach to the document access problem of insider threat INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2005, 3495 : 486 - 491
- [7] Insider Threat Likelihood Assessment for Flexible Access Control E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
- [8] On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC) IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 373 - 384
- [9] An insider threat aware access control for cloud relational databases Cluster Computing, 2017, 20 : 2669 - 2685
- [10] Preventative directions for insider threat mitigation via access control INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193