Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality
暂无分享,去创建一个
[1] Sadie Creese,et al. Understanding Insider Threat: A Framework for Characterising Attacks , 2014, 2014 IEEE Security and Privacy Workshops.
[2] Sadie Creese,et al. Formalising Policies for Insider-threat Detection: A Tripwire Grammar , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] Serban I. Gavrila,et al. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[4] Tao Su,et al. A formal approach for network security policy validation , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[5] Florian Kammüller,et al. Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[6] Elisa Bertino,et al. MIST 2016: 8th International Workshop on Managing Insider Security Threats , 2016, CCS.