Detecting Anomalies in Active Insider Stepping Stone AttacksImproved Estimation of Trilateration Distances for Indoor Wireless Intrusion DetectionRepresenting Humans in System Security Models: An Actor-Network ApproachCollaborative Intrusion Detection Networks and Insider AttacksModel for a Common Notion of Privacy Leakage on Public DatabaseA Preliminary Model of Insider Theft of Intellectual PropertyInsiders and Insider Threats An Overview of Definitions and Mitigation TechniquesGuest Editorial: Addressing Insider Threats and Information LeakageSecurity-by-Contract-with-Trust for Mobile DevicesProxies for Privacy in Ambient Systems