Author:
Besnaci Samiha,Hafidi Mohamed,Lamia Mahnane
Publisher
Springer Nature Switzerland
Reference25 articles.
1. Gayathri, R.G., Atul, S., Xiang, Y.: Image-Based Feature Representation for Insider Threat Classification. Appl. Sci. 10(14), 4945 (2020). https://doi.org/10.3390/app10144945
2. Figures: Insider threat statistics for 2022: facts and figures (2022). Ekransystem.com. Available: https://www.ekransystem.com/en/blog/insider-threat-statistics-factsand-figures. Accessed 05 Apr 2022
3. Verizon: 2019 Data Breach Investigations Report. In Computer Fraud & Security; Elsevier BV: Oxfordshire, UK, vol. 2019, p. 4 (2019)
4. Accenture/Ponemon Institute: The Cost of Cybercrime, Network Security; Elsevier BV: Amsterdam, The Netherlands, vol. 2019, p. 4 (2019)
5. IBM: Cost of a Data Breach Report 2019. In Computer Fraud & Security; Elsevier BV: Oxfordshire, UK, vol. 2019, p. 4 (2019)