Publisher
Springer Nature Singapore
Reference42 articles.
1. Lee C, Iesiev A, Usher M, Harz D, McMillenm D (2020) IBM X-force threat intelligence index 8. https://www.ibm.com/security/data-breach/threat-intelligence. Accessed 7 Feb 2021
2. Claycomb WR, Nicoll A (2012) Insider threats to cloud computing: directions for new research challenges. In: 2012 IEEE 36th annual computer software and applications conference, IEEE, Izmir, Turkey, 2012, pp. 387–394. https://doi.org/10.1109/COMPSAC.2012.113
3. Silowash G, Shimeall TJ, Cappelli D, Moore A, Flynn L, Trzeciak R (2012) Common sense guide to mitigating threats. https://doi.org/10.21236/ADA585500.
4. Erdin E, Aksu H, Uluagac S, Vai M, Akkaya K (2018) OS independent and hardware-assisted insider threat detection and prevention framework. In: Proc. 2018 IEEE military communications conference, IEEE, Los Angeles, CA, USA, pp. 926–932.https://doi.org/10.1109/MILCOM.2018.8599719
5. Almehmadi A (2018) Micromovement behavior as an intention detection measurement for preventing insider threats. IEEE Access 6:40626–40637. https://doi.org/10.1109/ACCESS.2018.2857450
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献