9Marianthi T,et al.The insider threat to information systems and the effectiveness of ISO17799.Computers&Security,2005,24(6):472-484. 被引量:1
10Magklaras G B,Fumell S M.A preliminary model of and user sophistication for insider threat prediction in IT systems.Computers&Security,2005,24(5):371-380. 被引量:1