Author:
Wang Xiaobin,Wang Yongjun,Liu Qiang,Sun Yonglin,Xie Peidai
Reference19 articles.
1. Bishop M, Gates C (2008) Defining the insider threat. In: CSIIRW’08
2. PfLeeger SL, StoLfo SJ (2009) Addressing the insider threat. In: IEEE security and privacy Nov/Dec, pp 22–29
3. Theoharidou M, Kokolakis S, Karyda M, Kiountouzis E (2005) The insider threat to information systems and the effectiveness of ISO17799. Comput Secur
4. Blackwell C (2009) A security architecture to protect against the insider threat from damage, fraud and theft. In: CSIIRW ‘09
5. Salem MB, Hershkop S, Stolfo SJ (2008) A survey of insider attack detection research, in insider attack and cyber security: beyond the hacker. Springer, New York
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献