[1]
S. I. Zhurin, ‚ÄúComprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider‚ÄĚ, J. ICT Res. Appl., vol. 8, no. 3, pp. 251-269, Mar. 2015.