Subject
Law,Medical Laboratory Technology,Computer Science Applications,Information Systems,Pathology and Forensic Medicine
Reference45 articles.
1. Insider misuse attribution using biometrics;Alruban,2017
2. Insider threat detection using log analysis and event correlation;Ambre;Procedia Computer Science,2015
3. Analyzing multiple logs for forensic evidence;Arasteh;Digit. Invest.,2007
4. Position: “insider” is relative;Bishop,2005
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research Opportunity of Insider Threat Detection based on Machine Learning Methods;2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC);2023-02-20