Editorial
Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour
Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data
Towards a Cyber Ontology for Insider Threats in the Financial Sector
Effects of Code Obfuscation on Android App Similarity Analysis