Author:
Sun Yuqing,Xu Haoran,Bertino Elisa,Sun Chao
Funder
National Natural Science Foundation of China
Independent Innovation and Achievements Transformation of Shandong Province
Science and Technology Development Program of Shandong Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computational Mechanics
Reference28 articles.
1. Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley Professional
2. Bertino E (2012) Data protection from insider threats. Synthesis Lectures on Data Management 4.4, pp 1–91
3. Mayhew M, Atighetchi M, Adler A et al (2015) Use of machine learning in big data analytics for insider threat detection. In: IEEE Proceedings of military communications conference. pp 915–922
4. Richardson R (2011) 15th annual 2010/2011 computer crime and security survey. Computer Security Institute, New York
5. Harel A, Shabtai A, Rokach L et al (2012) M-score: a misuseability weight measure. IEEE Trans Dependable Secure Comput 9(3):414–428
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献