Guest Editorial: Frontiers in Insider Threats and Data Leakage Prevention
From Insider Threats to Business Processes that are Secure-by-Design
Combining Baiting and User Search Profiling Techniques for Masquerade Detection
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries
Security Analysis of Oine E-cash Systems with Malicious Insider
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search
A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications
A Framework for Detecting Insider Threats using Psychological Triggers
Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine