共 50 条
- [1] Redefining insider threats: a distinction between insider hazards and insider threats Security Journal, 2021, 34 : 755 - 775
- [3] Identifying Indicators of Insider Threats: Insider IT Sabotage 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
- [4] Social engineering and Insider threats 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 25 - 34
- [6] A primer on insider threats in cybersecurity INFORMATION SECURITY JOURNAL, 2022, 31 (05): : 602 - 611
- [7] Isabelle Modelchecking for Insider Threats DATA PRIVACY MANAGEMENT AND SECURITY ASSURANCE, 2016, 9963 : 196 - 210
- [8] Modelling of Enterprise Insider Threats 2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 132 - 136
- [9] Identifying and Mitigating Insider Threats IT-INFORMATION TECHNOLOGY, 2011, 53 (04): : 202 - 206
- [10] Insider Threats in Information Security 2015 21ST INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2015, : 108 - 113