Guest Editorial: Frontiers in Insider Threats and Data Leakage Prevention
Guest Editorial: Managing Insider Security Threats (MIST 2012 Volume 1)
From Insider Threats to Business Processes that are Secure-by-Design
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs
Combining Baiting and User Search Profiling Techniques for Masquerade Detection
Behavioural Patterns Analysis of Low Entropy People Using Proximity Data
Design of Categorization Mechanism for Disaster-Information-Gathering System
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries