共 50 条
- [1] Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016, 2017, 10128 : 135 - 142
- [2] An insider threat aware access control for cloud relational databases Cluster Computing, 2017, 20 : 2669 - 2685
- [3] Preventative directions for insider threat mitigation via access control INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 165 - 193
- [4] An insider threat aware access control for cloud relational databases CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
- [5] An Access Abstraction Model for Mitigating the Insider Threat ACMSE 2020: PROCEEDINGS OF THE 2020 ACM SOUTHEAST CONFERENCE, 2020, : 320 - 321
- [6] Sensing insider threat based on access vectors Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (01): : 110 - 115
- [7] Towards a theory of insider threat assessment 2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 108 - 117
- [8] A Framework for Threat Assessment in Access Control Systems INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 187 - 198
- [10] Caught in the Act of an Insider Attack: Detection and Assessment of Insider Threat 2015 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2015,