共 50 条
- [41] Modeling Expert Judgments of Insider Threat Using Ontology Structure: Effects of Individual Indicator Threat Value and Class Membership PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3202 - 3211
- [43] Web application threat modeling and quantitative assessment Qinghua Daxue Xuebao, 2009, SUPPL. 2 (2108-2112):
- [44] Assessment method for driving threat perception Guo, Z.-Z. (guozizheng@swjtu.edu.cn), 1600, Editorial Board of Jilin University (42):
- [45] An insider threat detection method based on improved Test-Time Training model HIGH-CONFIDENCE COMPUTING, 2025, 5 (01):
- [46] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
- [47] Automated Insider Threat Detection System Using User and Role-Based Profile Assessment IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 503 - 512
- [48] A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ 2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 1440 - 1443
- [49] Application of the threat modeling method in an operating system REVISTA DE GESTAO E SECRETARIADO-GESEC, 2023, 14 (04): : 5102 - 5122
- [50] Employee Performance Assessment with Profile Matching Method 2018 6TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT (CITSM), 2018, : 553 - 558