共 50 条
- [31] The Insider Threat in Cloud Computing CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
- [32] Software Decoys for Insider Threat 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
- [33] Insider Threat Detection: A Review 2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 147 - 153
- [34] Inside the Insider Threat (Introduction) PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2637 - 2637
- [35] Intelligence Analyses and the Insider Threat IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (02): : 331 - 347
- [37] An Insider Threat Prediction Model TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2010, 6264 : 26 - 37
- [39] Inside the Insider Threat (Introduction) PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 2728 - 2728
- [40] Guarding Against the Insider Threat JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2009, 101 (05): : 38 - +