Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
Formalising policies for insider-threat detection: A tripwire grammar
Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation
A formal approach for network security policy validation