Guest Editorial: Addressing Insider Threats and Information Leakage
Insiders and Insider Threats An Overview of Definitions and Mitigation Techniques
A Preliminary Model of Insider Theft of Intellectual Property
Model for a Common Notion of Privacy Leakage on Public Database
Collaborative Intrusion Detection Networks and Insider Attacks
Representing Humans in System Security Models: An Actor-Network Approach
Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection
Detecting Anomalies in Active Insider Stepping Stone Attacks