共 50 条
- [21] Model Based Analysis of Insider Threats 2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
- [22] Towards Formal Analysis of Insider Threats for Auctions MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 23 - 34
- [23] Predict insider threats using human behaviors IEEE Engineering Management Review, 2017, 45 (01): : 39 - 48
- [24] Understanding and countering insider threats in software development 2008 INTERNATIONAL MCETECH CONFERENCE ON E-TECHNOLOGIES, PROCEEDINGS, 2007, : 81 - 90
- [25] Detecting and Preventing Cyber Insider Threats: A Survey IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02): : 1397 - 1417
- [27] Positioning Your Organization to Respond to Insider Threats IEEE Engineering Management Review, 1600, 47 (02): : 75 - 83
- [28] Rising to the Challenge of Insider Threats for Middle Powers PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2020), 2020, : 521 - 529
- [29] Mining for Insider Threats in Business Transactions and Processes 2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, 2009, : 163 - 170
- [30] Access control requirements for preventing insider threats INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 529 - 534