3Pfleeger S L, et al, Insiders behaving badly: Addressing bad actors and their actions. IEEE Transactions on Information Forensics and Security, 2010, 5(1): 169-179. 被引量:1
5Schonlau M, Dumouchel W, Iu W, et al. Computer intrusion: Detecting masquerades. Statistical Science, 2001: 58-74. 被引量:1
6Salem M, Stolfo S. Modeling user search behavior for masquerade detectionllProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2011: 181-200. 被引量:1
7Zheng N, Palo ski A, Wang H, An efficient user verification system via mouse movementsllProceedings of the 18th ACM Conference On Computer and communications. Chicago, Illinois, USA, 2011: 139-150. 被引量:1
8Brackney R C, Anderson R H. Understanding the Insider Threat: Proceedings of a March 2004 Workshop. Santa Monica, CA: RAND Corporation, 2004. http://www. rand. org/ pubs/conLproceedings/CF196. 被引量:1
9Maloof M, Stephens G. Elicit: A system for detecting insiders who violate need-to-knowIIProceeding of the 14th International Symposium Recent Advances in Intrusion Detection. Berlin Heidelberg: Springer, 2007: 146-166. 被引量:1
10Poolsappasit N, Dewri R, Ray 1. Dynamic security risk management using Bayesian attack graphs. IEEE Transactions on Dependable and Secure Computing, 2012, 9(1): 61-74. 被引量:1