共 50 条
- [21] Automatic Derivation and Validation of a Cloud Dataset for Insider Threat Detection ICSOFT: PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2017, : 480 - 487
- [25] Data Integration of Cloud-based and Relational Databases 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING TECHNIQUES AND IMPLEMENTATIONS (ICSCTI), 2015,
- [26] A Method of Protecting Relational Databases Copyright with Cloud Watermark PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 68 - 72
- [28] Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions 2013 THIRD WORKSHOP ON SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST (STAST 2013), 2013, : 26 - 36
- [29] Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry PROCEEDINGS OF THE 2019 IEEE 23RD INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2019, : 16 - 21