Author:
Janjua Faisal,Masood Asif,Abbas Haider,Rashid Imran
Reference24 articles.
1. Insiders and Insider Threats-An Overview of Definitions and Mitigation Techniques;Hunker;J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.,2011
2. https://www.mimecast.com/content/insider-threat/
3. Greitzer, F. L. (2019) ”Insider Threats: It’s the HUMAN, Stupid!”. Proceedings of the Northwest Cyber security Symposium: 1-8.
4. ”Machine learning techniques for anomaly detection: an overview”;Omar;International Journal of Computer Applications,2013
5. Analyzing Data Granularity Levels for Insider Threat Detection Using Machine Learning.;Le;IEEE Transactions on Network and Service Management.,2020
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献