共 50 条
- [41] Insider Threat Detection Using Graph-Based Approaches CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 237 - +
- [43] Weak models for insider threat detection SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE(C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE III, PTS 1 AND 2, 2004, 5403 : 40 - 48
- [44] Review on Insider Threat Detection Techniques 3RD INTERNATIONAL CONFERENCE ON SCIENCE AND SUSTAINABLE DEVELOPMENT (ICSSD 2019): SCIENCE, TECHNOLOGY AND RESEARCH: KEYS TO SUSTAINABLE DEVELOPMENT, 2019, 1299
- [45] Insider Threat Detection and Cloud Computing ADVANCES IN DATA AND INFORMATION SCIENCES, 2022, 318 : 81 - 90
- [46] Analytics for early detection of insider threat SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXXI, 2022, 12122
- [47] An integrated system for insider threat detection ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 75 - +
- [48] A Tripwire Grammar for Insider Threat Detection MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 105 - 108
- [49] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,