Guest Editorial: Emerging Trends in Research for Insider Threat Detection
Insider Threat Defined: Discovering the Prototypical Case
Differentiating User Authentication Graphs
Invalidating Policies using Structural Information
Generating Test Data for Insider Threat Detectors