R. Brackney, A. , and R. Rand-corporation, Understanding the insider threat, Proceedings of a march, 2004.

L. Gordon, M. Loeb, W. Lucyshyn, and R. Richardson, Computer Crime and Security Survey Available at http://www.cpppe.umd, 2005.

Q. Yaseen and B. Panda, Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems, 2009 International Conference on Computational Science and Engineering, pp.450-455, 2009.
DOI : 10.1109/CSE.2009.159

M. Chagarlamudi, . Panda, and Y. Hu, Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases, 2009 Sixth International Conference on Information Technology: New Generations, pp.1616-1620, 2009.
DOI : 10.1109/ITNG.2009.67

M. Bishop and C. Gates, Defining the insider threat, Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, 2008.
DOI : 10.1145/1413140.1413158

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.4390

M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matznera et al., Analysis and Detection of Malicious Insiders, Proceedings of the International Conference on Intelligence Analysis, 2005.

L. Spitzner, Honeypots: catching the insider threat, 19th Annual Computer Security Applications Conference, 2003. Proceedings., 2003.
DOI : 10.1109/CSAC.2003.1254322

Q. Althebyan and B. Panda, A Knowledge-Base Model for Insider Threat Prediction, 2007 IEEE SMC Information Assurance and Security Workshop, pp.239-246, 2007.
DOI : 10.1109/IAW.2007.381939

C. Farkas and S. Jajodia, The inference problem, ACM SIGKDD Explorations Newsletter, vol.4, issue.2, pp.6-11, 2002.
DOI : 10.1145/772862.772864

C. Farkas, T. Toland, and C. Eastman, The Inference Problem and Updates in Relational Databases, Proceedings of the 15th IFIP WG11.3 Working Conference on Database and Application Security, pp.181-194, 2001.
DOI : 10.1007/978-0-387-35587-0_13

A. Brodsky, C. Farkas, and S. Jajodia, Secure databases: constraints, inference channels, and monitoring disclosures, IEEE Transactions on Knowledge and Data Engineering, vol.12, issue.6, pp.900-919, 2000.
DOI : 10.1109/69.895801

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.2195

R. Yip and K. Levitt, Data level inference detection in database systems, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), pp.179-189, 1998.
DOI : 10.1109/CSFW.1998.683168

T. Murata, Petri nets: Properties, analysis and applications, Proceedings of the IEEE, pp.541-580, 1989.
DOI : 10.1109/5.24143