2Schultz E.A Framework for Understanding and Predicting Insider At-tacks[J].Computer and Security,2002,21(6):526-531. 被引量:1
3Ray I,Poolsapassit N.Using Attack Trees to Identify Malicious Attacksfrom Authorized Insiders[C]//Proceedings of the 10th European Trus-ted system concepts,Computers&Security,1995(14):45-56. 被引量:1
4Wang Hui,Xu Heli.Lu Bibo,et al.Research on Security Architecturefor Defending Insider Threat[C]//2009 Fifth International Conferenceon Information Assurance and Security,2009:30-33. 被引量:1
5Kathryn Blackmond Laskey.MEBN:A Logic for Open-World Probabi-listic Reasoning[R].GMU C41 Center Technical Report C41-06-01,2006. 被引量:1
6Mahoney S M,Laskey K B.Constructing Situation Specific Belief Net-works[C]//The 14th Conference of Uncertainty in Artificial Intelli-gence.San Mateo,CA,Morgan Kaufmann,1998:370-378. 被引量:1
7Hadden J, Tiwari A, Roy R, et al. Computer Assisted Customer Chum Management: State-of-the-Art and Future Trends. Computers & Operations Research, 2007, 34 (10) : 2902 -2917. 被引量:1
8Coussement K, Van den Poel D. Chum Prediction in Subscription Services : An Application of Support Vector Machines While Compa- ring Two Parameter-Selection Techniques. Expert Systems with Applications, 2008, 34( 1 ) : 313-327. 被引量:1
9Idris A, Rizwan M, Khan A. Chum Prediction in Telecom Using Random Forest and PSO Based Data Balancing in Combination with Various Feature Selection Strategies. Computers & Electrical Engi- neering, 2012, 38(6): 1808-1819. 被引量:1
10Burez J, Van den Poel D. Handling Class Imbalance in Customer Chum Prediction. Expert Systems with Applications, 2009, 36 ( 3 ) : 4626-4636. 被引量:1