• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Bychkov D. Insider Threats to the Military Health System: A Systematic Background Check of TRICARE West Providers. JMIRx Med 2024;5:e52198. [PMID: 38602314 PMCID: PMC11024397 DOI: 10.2196/52198] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/25/2023] [Revised: 12/01/2023] [Accepted: 02/05/2024] [Indexed: 04/12/2024]
2
Wang J, Liu J, Yan T, Xia M, Hong J, Zhou C. A Fusion Model Based on Dynamic Web Browsing Behavior Analysis for IoT Insider Threat Detection. Sensors (Basel) 2022;22:6471. [PMID: 36080931 PMCID: PMC9460052 DOI: 10.3390/s22176471] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/25/2022] [Revised: 08/19/2022] [Accepted: 08/24/2022] [Indexed: 06/15/2023]
3
Kim JH, Kim CM, Yim MS. An Investigation of Insider Threat Mitigation Based on EEG Signal Classification. Sensors (Basel) 2020;20:E6365. [PMID: 33171609 DOI: 10.3390/s20216365] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/12/2020] [Revised: 11/02/2020] [Accepted: 11/06/2020] [Indexed: 12/04/2022]
4
Hu T, Xin B, Liu X, Chen T, Ding K, Zhang X. Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats. Sensors (Basel) 2020;20:E5297. [PMID: 32947915 DOI: 10.3390/s20185297] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2020] [Revised: 09/11/2020] [Accepted: 09/13/2020] [Indexed: 11/17/2022]
5
Deep G, Mohana R, Nayyar A, Sanjeevikumar P, Hossain E. Authentication Protocol for Cloud Databases Using Blockchain Mechanism. Sensors (Basel) 2019;19:E4444. [PMID: 31615014 DOI: 10.3390/s19204444] [Citation(s) in RCA: 35] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/13/2019] [Revised: 10/09/2019] [Accepted: 10/10/2019] [Indexed: 12/03/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA