1.
Zhurin SI. Comprehensiveness of Response to Internal Cyber-Threat and Selection of Methods to Identify the Insider. J. ICT Res. Appl. [Internet]. 2015Mar.31 [cited 2025Jan.16];8(3):251-69. Available from: https://journals.itb.ac.id/index.php/jictra/article/view/576