(1)
Zhurin, S. I. Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider. J. ICT Res. Appl. 2015, 8, 251-269.