共 50 条
- [41] Rising to the Challenge of Insider Threats for Middle Powers PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 521 - 529
- [42] Towards Formal Analysis of Insider Threats for Auctions MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
- [43] Predict insider threats using human behaviors IEEE Engineering Management Review, 2017, 45 (01): : 39 - 48
- [44] Understanding and countering insider threats in software development 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90
- [45] Assessment of ESD threats to electronic components and ESD control requirements ELECTROSTATICS 2003, 2004, (178): : 247 - 252
- [46] Mining for Insider Threats in Business Transactions and Processes 2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, 2009, : 163 - 170
- [48] A Multidimension Taxonomy of Insider Threats in Cloud Computing COMPUTER JOURNAL, 2016, 59 (11): : 1612 - 1622