共 50 条
- [2] Business Process Mining based Insider Threat Detection System ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 2017, 1 : 467 - 478
- [3] An insider threat detection method based on business process mining International Journal of Business Data Communications and Networking, 2017, 13 (02): : 83 - 98
- [4] Modeling of Insider Threat using Enterprise Automaton PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
- [5] Modeling variability in business process models using UML PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 82 - 87
- [6] Using dynamic models to support inferences of insider threat risk Computational and Mathematical Organization Theory, 2016, 22 : 350 - 381
- [7] Insider threat analysis using information-centric modeling ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 55 - +
- [9] Modeling the emergence of insider threat vulnerabilities PROCEEDINGS OF THE 2006 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2006, : 562 - +
- [10] Weak models for insider threat detection SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48