共 50 条
- [31] Insider Threat Detection in PRODIGAL PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2648 - 2657
- [33] Balancing the insider and outsider threat Computer Fraud and Security, 2006, 2006 (11): : 8 - 11
- [34] A Method of Evaluation for Insider Threat 2014 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C 2014), 2014, : 438 - 441
- [35] Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection MOBILE NETWORKS & APPLICATIONS, 2020, 29 (5): : 1680 - 1689
- [37] TOWARDS A USER AND ROLE-BASED BEHAVIOR ANALYSIS METHOD FOR INSIDER THREAT DETECTION PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC), 2018, : 6 - 10
- [39] Shadow-IT System and Insider Threat: An Assessment of an Opportunity Dimension for the Identity Theft HCI INTERNATIONAL 2018 - POSTERS' EXTENDED ABSTRACTS, PT III, 2018, 852 : 314 - 317
- [40] Towards More Effective Insider Threat Countermeasures: A Survey of Approaches for Addressing Challenges and Limitations 18TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON 2024, 2024,