共 50 条
- [23] Insider Threat Likelihood Assessment for Flexible Access Control E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 77 - 95
- [24] The influence of insider law on preventing insider information leakage Metallurgical and Mining Industry, 2015, 7 (09): : 446 - 451
- [26] Insider Threats to IT Security of Critical Infrastructures Studies in Big Data, 2021, 84 : 381 - 394
- [27] Insider Threats: It's the HUMAN, Stupid! NCS'19: PROCEEDINGS OF THE NORTHWEST CYBERSECURITY SYMPOSIUM, 2019,
- [28] Semantic analysis for monitoring insider threats INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 492 - 500
- [29] Mitigating Inadvertent Insider Threats with Incentives FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 1 - 16
- [30] Detecting Insider Threats: Solutions and Trends INFORMATION SECURITY JOURNAL, 2012, 21 (04): : 183 - 192