共 50 条
- [21] Access control requirements for preventing insider threats INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534
- [25] Reflections on the insider threat INSIDER ATTACK AND CYBER SECURITY: BEYOND THE HACKER, 2008, 39 : 5 - 15
- [26] Memory Access Pattern based Insider Threat Detection in Big Data Systems 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3625 - 3628
- [27] RAP-Net: A Resource Access Pattern Network for Insider Threat Detection 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
- [29] The Insider Threat in Cloud Computing CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 93 - 103
- [30] Software Decoys for Insider Threat 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,