[1]
Zhurin, S.I. 2015. Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider. Journal of ICT Research and Applications. 8, 3 (Mar. 2015), 251-269. DOI:https://doi.org/10.5614/itbj.ict.res.appl.2015.8.3.5.