scholarly journals An Insider Threat Detection Method Based on User Behavior Analysis

Author(s):  
Wei Jiang ◽  
Yuan Tian ◽  
Weixin Liu ◽  
Wenmao Liu
Author(s):  
Hai-Tao Zheng ◽  
Xin Yao ◽  
Yong Jiang ◽  
Shu-Tao Xia ◽  
Xi Xiao

Author(s):  
Yoshiyuki Shoji ◽  
Sumio Fujita ◽  
Akira Tajima ◽  
Katsumi Tanaka

2019 ◽  
Vol 31 (9) ◽  
pp. 1822-1835 ◽  
Author(s):  
Peng Cheng ◽  
Ji Hu ◽  
Zidong Yang ◽  
Yuanchao Shu ◽  
Jiming Chen

電腦學刊 ◽  
2021 ◽  
Vol 32 (4) ◽  
pp. 201-210
Author(s):  
Zhenjiang Zhang Zhenjiang Zhang ◽  
Yang Zhang Zhenjiang Zhang


Sign in / Sign up

Export Citation Format

Share Document