共 50 条
- [41] Game Theoretic Modeling of Insider Threats in an Organization APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT II, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14587 : 188 - 192
- [42] Critical Analysis in the Research Area of Insider Threats 2017 IEEE 5TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2017), 2017, : 288 - 296
- [43] Detection of Temporal Insider Threats to Relational Databases 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 406 - 415
- [44] Reporting Insider Threats via Covert Channels IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 68 - 71
- [47] Analysis of Research on Specific Insider Information Security Threats RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 725 - 735
- [48] Insider Threats in Emerging Mobility-as-a-Service Scenarios PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2658 - 2667
- [49] Insider Threats and Individual Differences: Intention and Unintentional Motivations IEEE Transactions on Technology and Society, 2022, 3 (03): : 175 - 184
- [50] Modeling and Verification of Insider Threats Using Logical Analysis IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 534 - 545