共 50 条
- [32] Understanding factors that influence unintentional insider threat: a framework to counteract unintentional risks Cognition, Technology & Work, 2022, 24 : 393 - 421
- [34] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,
- [36] Insider Threat Program Best Practices PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 1831 - 1839
- [37] Cybercrime Countermeasure of Insider Threat Investigation 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 413 - 418
- [38] Weak models for insider threat detection SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48