A survey on data leakage prevention systems, J. Netw. Comput. Appl, vol.62, issue.C, pp.137-152, 2016. ,
Application of fuzzy logic in computer security and forensics, Computational Intelligence for Privacy and Security, vol.394, pp.35-49, 2012. ,
Decision-making in a fuzzy environment, Manage. Sci, vol.17, issue.4, pp.141-164, 1970. ,
A traceability chain algorithm for artificial neural networks using ts fuzzy cognitive maps in blockchain, Future Generation Computer Systems, vol.80, pp.198-210, 2018. ,
Insight into insiders: A survey of insider threat taxonomies, analysis, modeling, and countermeasures, 2018. ,
A secure and practical signature scheme for blockchain based on biometrics, Information Security Practice and Experience -13th International Conference, vol.10701, pp.877-891, 2017. ,
Blockchain and artificial intelligence, 2018. ,
Honeypots: Catching the insider threat, Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC '03, p.170, 2003. ,
Fog computing: Mitigating insider data theft attacks in the cloud, Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, SPW '12, pp.125-128, 2012. ,
Study and improvements for the real-time performance of linux kernel, 3rd International Conference on Biomedical Engineering and Informatics, vol.7, pp.2766-2769, 2010. ,
Design and implementation of secure auditing system in linux kernel, 2007 International Workshop on AntiCounterfeiting, Security and Identification (ASID), pp.232-236, 2007. ,