Cited By
View all- Xiao LYu AWang HZhao LMeng D(2024)MLCAC: Dynamic Authorization and Intelligent Decision-making towards Insider Threats2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10580595(407-412)Online publication date: 8-May-2024
- Bardhan S(2024)A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00190(1440-1443)Online publication date: 2-Jul-2024
- YANO TKUZUNO HMAGATA K(2023)File Tracking and Visualization Methods Using a Network Graph to Prevent Information LeakageIEICE Transactions on Information and Systems10.1587/transinf.2022ICP0014E106.D:9(1339-1353)Online publication date: 1-Sep-2023
- Show More Cited By