共 50 条
- [21] Data Integration of Cloud-based and Relational Databases 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND IMPLEMENTATIONS (ICSCTI), 2015,
- [22] A Method of Protecting Relational Databases Copyright with Cloud Watermark PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 68 - 72
- [24] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions 2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
- [25] Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry PROCEEDINGS OF THE 2019 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2019, : 16 - 21
- [30] Reflections on the insider threat INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15