共 50 条
- [31] Federated Platooning: Insider Threats and Mitigations PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 3222 - 3231
- [32] Introduction to the Special Issue on Insider Threats DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (01):
- [33] Model Based Analysis of Insider Threats 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
- [34] Preventing Insider Attacks in the Cloud ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
- [35] Preventative directions for insider threat mitigation via access control INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
- [36] An insider threat aware access control for cloud relational databases Cluster Computing, 2017, 20 : 2669 - 2685
- [37] An insider threat aware access control for cloud relational databases CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
- [38] ACCESS CONTROL REQUIREMENTS FOR PRIVACY AND SECURITY INFORMATION PRIVACY, 1979, 1 (07): : 312 - 314
- [40] Positioning Your Organization to Respond to Insider Threats IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83