共 20 条
[11]
Lee SY, 2002, LECT NOTES COMPUT SC, V2502, P264
[12]
Li W., 2012, LECT NOTES COMPUTER, V7671, P223
[13]
Mathew S, 2010, LECT NOTES COMPUT SC, V6307, P382, DOI 10.1007/978-3-642-15512-3_20
[14]
POSTER: Protecting Against Data Exfiltration Insider Attacks Through Application Programs
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1493-1495
[15]
Shebaro B., 2013, Proceedings of the 16th International Conference on Extending Database Technology, EDBT '13, P741
[16]
Spalka A, 2005, LECT NOTES COMPUT SC, V3654, P207
[17]
Xiong HJ, 2009, LECT NOTES COMPUT SC, V5927, P293, DOI 10.1007/978-3-642-11145-7_23
[18]
Yaseen Qussai, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P450, DOI 10.1109/CSE.2009.159
[19]
Yaseen Q, 2010, LECT NOTES COMPUT SC, V6033, P368, DOI 10.1007/978-3-642-12368-9_30
[20]
Zhang H, 2014, P 9 ACM S INF COMP C, P39