[1]
S. I. Zhurin, “Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider”, J. ICT Res. Appl., vol. 8, no. 3, pp. 251-269, Mar. 2015.