Funder
Project of Jilin Higher Education Association
Publisher
Springer Science and Business Media LLC
Reference27 articles.
1. Beekman, J. A., Woodaman, R. F. A. & Buede, D. M. A review of probabilistic opinion pooling algorithms with application to insider threat detection. Decis. Anal. 17(1), 39–55 (2020).
2. Prabhu, S. & Thompson, N. A primer on insider threats in cybersecurity. Inf. Secur. J. Glob. Perspect. 31(5), 602–611 (2022).
3. Al-Mhiqani, M. N. et al. A new intelligent multilayer framework for insider threat detection. Comput. Electr. Eng. 97, 107597 (2022).
4. Georgiadou, A., Mouzakitis, S. & Askounis, D. Detecting insider threat via a cyber-security culture framework. J. Comput. Inf. Syst. 62(4), 706–716 (2022).
5. Wei, Y., Chow, K. P. & Yiu, S. M. Insider threat prediction based on unsupervised anomaly detection scheme for proactive forensic investigation. For. Sci. Int. Digit. Invest. 38, 301126 (2021).