Works matching Insider threat
1
- Journal of Data Acquisition & Processing / Shu Ju Cai Ji Yu Chu Li, 2022, v. 37, n. 3, p. 488, doi. 10.16337/j.1004-9037.2022.03.002
- 郭世泽;
- 张磊;
- 潘雨;
- 陶蔚;
- 白玮;
- 郑奇斌;
- 刘艺;
- 潘志松
- Article
2
- Data Science & Engineering, 2024, v. 9, n. 4, p. 393, doi. 10.1007/s41019-024-00260-z
- Manoharan, Phavithra;
- Hong, Wei;
- Yin, Jiao;
- Wang, Hua;
- Zhang, Yanchun;
- Ye, Wenjie
- Article
3
- Applied Sciences (2076-3417), 2020, v. 10, n. 15, p. 5208, doi. 10.3390/app10155208
- Al-Mhiqani, Mohammed Nasser;
- Ahmad, Rabiah;
- Zainal Abidin, Z.;
- Yassin, Warusia;
- Hassan, Aslinda;
- Abdulkareem, Karrar Hameed;
- Ali, Nabeel Salih;
- Yunos, Zahri
- Article
4
- Romanian Intelligence Studies Review / Revista Romana de Studii de Intelligence, 2015, n. 14, p. 91
- Article
5
- Telecommunication Systems, 2024, v. 87, n. 4, p. 899, doi. 10.1007/s11235-023-01085-3
- Manoharan, Phavithra;
- Yin, Jiao;
- Wang, Hua;
- Zhang, Yanchun;
- Ye, Wenjie
- Article
6
- IET Communications (Wiley-Blackwell), 2019, v. 13, n. 12, p. 1728, doi. 10.1049/iet-com.2018.5736
- Li, Beibei;
- Lu, Rongxing;
- Xiao, Gaoxi;
- Bao, Haiyong;
- Ghorbani, Ali A.
- Article
7
- Computational & Mathematical Organization Theory, 2022, v. 28, n. 4, p. 335, doi. 10.1007/s10588-021-09341-0
- Alhajjar, Elie;
- Bradley, Taylor
- Article
8
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 102, doi. 10.11959/j.issn.2096-109x.2023042
- FENG Guanyun;
- FU Cai;
- LYU Jianqiang;
- HAN Lansheng
- Article
9
- Journal of Supercomputing, 2025, v. 81, n. 1, p. 1, doi. 10.1007/s11227-024-06752-z
- Article
10
- Journal on Communication / Tongxin Xuebao, 2018, v. 39, n. 12, p. 141, doi. 10.11959/j.issn.1000-436x.2018282
- Article
11
- Electronics (2079-9292), 2024, v. 13, n. 24, p. 4885, doi. 10.3390/electronics13244885
- Ding, Junmei;
- Qian, Peng;
- Ma, Jing;
- Wang, Zhiqiang;
- Lu, Yueming;
- Xie, Xiaqing
- Article
12
- Electronics (2079-9292), 2021, v. 10, n. 9, p. 1005, doi. 10.3390/electronics10091005
- Alsowail, Rakan A.;
- Al-Shehari, Taher
- Article
13
- Electronics (2079-9292), 2020, v. 9, n. 9, p. 1460, doi. 10.3390/electronics9091460
- Saxena, Neetesh;
- Hayes, Emma;
- Bertino, Elisa;
- Ojo, Patrick;
- Choo, Kim-Kwang Raymond;
- Burnap, Pete
- Article
14
- Scientific Reports, 2025, v. 15, n. 1, p. 1, doi. 10.1038/s41598-025-04029-w
- Ye, Xiaoyun;
- Luo, Faqin;
- Cui, Huangrongbin;
- Wang, Jinlong;
- Xiong, Xiaoyun;
- Zhang, Wencui;
- Yu, Jiawei;
- Zhao, Wenhao
- Article
15
- Information Security Journal: A Global Perspective, 2025, v. 34, n. 1, p. 63, doi. 10.1080/19393555.2024.2387347
- Holden, Heather;
- Munro, Victor;
- Tsakiris, Lina;
- Wilner, Alex
- Article
16
- Information Security Journal: A Global Perspective, 2022, v. 31, n. 3, p. 338, doi. 10.1080/19393555.2021.1998735
- Article
17
- International Journal of Online & Biomedical Engineering, 2021, v. 17, n. 2, p. 69, doi. 10.3991/ijoe.v17i02.18297
- Sawatnatee, Amnat;
- Prakancharoen, Somchai
- Article
18
- Journal of Information Science Theory & Practice (JIStaP), 2019, v. 7, n. 1, p. 52, doi. 10.1633/JISTaP.2019.7.1.5
- Sang-Sang Tan;
- Jin-Cheon Na;
- Duraisamy, Santhiya
- Article
19
- Issues in Information Systems, 2014, v. 15, n. 2, p. 185
- Article
20
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 9, p. 2767, doi. 10.3969/j.issn.1001-3695.2013.09.052
- Wang Hui;
- YANG Guang-can;
- HAN Dong-mei
- Article
21
- Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 2018, v. 25, n. 2, p. 122, doi. 10.22594/dau.16-771.25.02
- Mills, Jennifer U.;
- Dever, Jason R.;
- Stuban, Steven M. F.
- Article
22
- Mobile Networks & Applications, 2024, v. 29, n. 5, p. 1680, doi. 10.1007/s11036-020-01656-7
- Tian, Zhihong;
- Shi, Wei;
- Tan, Zhiyuan;
- Qiu, Jing;
- Sun, Yanbin;
- Jiang, Feng;
- Liu, Yan
- Article
23
- Sustainability (2071-1050), 2023, v. 15, n. 1, p. 491, doi. 10.3390/su15010491
- Zeng, Min;
- Dian, Chuanzhou;
- Wei, Yaoyao
- Article
24
- Journal of Risk Research, 2021, v. 24, n. 9, p. 1180, doi. 10.1080/13669877.2020.1806910
- Bedford, Justine;
- van der Laan, Luke
- Article
25
- Turkish Journal of Electrical Engineering & Computer Sciences, 2018, v. 26, n. 2, p. 792, doi. 10.3906/elk-1706-163
- Jiange ZHANG;
- Yue CHEN;
- Ankang JU
- Article
26
- Online Journal of Applied Knowledge Management, 2019, v. 7, n. 1, p. 40, doi. 10.36965/ojakm.2019.7(1)40-52
- Clarke, Karla;
- Levy, Yair;
- Dringus, Laurie;
- Brown, Shonda
- Article
27
- Wireless Networks (10220038), 2024, v. 30, n. 4, p. 2819, doi. 10.1007/s11276-024-03678-5
- Anju, A.;
- Krishnamurthy, M.
- Article
28
- Journal of Airport Management, 2016, v. 10, n. 2, p. 180, doi. 10.69554/fdpy2338
- Branker, Jonathan;
- Eveleigh, Tim;
- Holzer, Thomas H.;
- Sarkani, Shahryar
- Article
29
- South African Journal of Information Management, 2022, v. 24, n. 1, p. 1, doi. 10.4102/sajim.v24i1.1573
- Silaule, Carol B.;
- Makhubele, Lean M.;
- Mamorobela, Stevens P.
- Article
30
- Applied Sciences (2076-3417), 2023, v. 13, n. 24, p. 13021, doi. 10.3390/app132413021
- Wang, Jiarong;
- Sun, Qianran;
- Zhou, Caiqiu
- Article
31
- Applied Sciences (2076-3417), 2020, v. 10, n. 15, p. 5046, doi. 10.3390/app10155046
- Nicolaou, Andreas;
- Shiaeles, Stavros;
- Savage, Nick
- Article
32
- Applied Sciences (2076-3417), 2020, v. 10, n. 14, p. 4945, doi. 10.3390/app10144945
- Gayathri, R. G.;
- Sajjanhar, Atul;
- Xiang, Yong
- Article
33
- Applied Sciences (2076-3417), 2019, v. 9, n. 19, p. 4018, doi. 10.3390/app9194018
- Kim, Junhong;
- Park, Minsik;
- Kim, Haedong;
- Cho, Suhyoun;
- Kang, Pilsung
- Article
34
- KSII Transactions on Internet & Information Systems, 2018, v. 12, n. 4, p. 1887, doi. 10.3837/tiis.2018.04.027
- Dong-Wook Kim;
- Sung-Sam Hong;
- Myung-Mook Han
- Article
35
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 10, p. 5062, doi. 10.3837/tiis.2017.10.020
- Janghyuk Kauh;
- Wongi Lim;
- Koohyung Kwon;
- Jong-Eon Lee;
- Jung-Jae Kim;
- Minwoo Ryu;
- Si-Ho Cha
- Article
36
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 240, doi. 10.1049/iet-ifs.2014.0063
- Article
37
- Engineering, Technology & Applied Science Research, 2024, v. 14, n. 2, p. 13341, doi. 10.48084/etasr.6911
- Article
38
- 2024
- Marbut, A. R.;
- Harms, P. D.
- Literature Review
39
- Journal of Information System Security, 2024, v. 20, n. 3, p. 185
- Joubert, Daniël;
- Eloff, Jan
- Article
40
- Journal of Information System Security, 2017, v. 13, n. 3, p. 151
- Leung Chim;
- Bilusich, Daniel;
- Lord, Steven;
- Nunes-Vaz, Rick
- Article
41
- Intelligent Automation & Soft Computing, 2022, v. 33, n. 1, p. 619, doi. 10.32604/iasc.2022.021430
- Haq, Mohd Anul;
- Khan, Mohd Abdul Rahim;
- Alshehri, Mohammed
- Article
42
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 405, doi. 10.1080/10798587.2015.1121617
- Article
43
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22953, doi. 10.1007/s11042-022-12173-y
- Singh, Malvika;
- Mehtre, BM;
- Sangeetha, S
- Article
44
- SocioEconomic Challenges (SEC), 2024, v. 8, n. 2, p. 44, doi. 10.61093/sec.8(2).44-63.2024
- Article
45
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00321-w
- Tian, Tian;
- Zhang, Chen;
- Jiang, Bo;
- Feng, Huamin;
- Lu, Zhigang
- Article
46
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-023-00190-9
- Song, Shuang;
- Gao, Neng;
- Zhang, Yifei;
- Ma, Cunqing
- Article
47
- e-Service Journal, 2013, v. 9, n. 1, p. 106, doi. 10.2979/eservicej.9.1.106
- Greitzer, Frank L.;
- Kangas, Lars J.;
- Noonan, Christine F.;
- Brown, Christopher R.;
- Ferryman, Thomas
- Article
49
- International Journal of Information Security, 2012, v. 11, n. 4, p. 269, doi. 10.1007/s10207-012-0165-6
- Yaseen, Qussai;
- Panda, Brajendra
- Article
50
- IADIS International Journal on Computer Science & Information Systems, 2021, v. 16, n. 1, p. 81
- Jabbour, Ghassan (Gus);
- Jabbour, Jason J.
- Article