IEEE Security and Privacy
A data-centric approach to insider attack detection in database systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
An insider threat prediction model
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
An ontological approach to the document access problem of insider threat
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
Two-stage database intrusion detection by combining multiple evidence and belief update
Information Systems Frontiers
Application of density-based outlier detection to database activity monitoring
Information Systems Frontiers
Understanding insiders: An analysis of risk-taking behavior
Information Systems Frontiers
Information Systems Frontiers
Hi-index | 0.00 |