F. Armknecht and A. Dewald, Privacy-preserving email forensics, Digital Investigation 14S1742287615000481, the Proceedings of the Fifteenth Annual DFRWS Conference, pp.127-136, 2015.
DOI : 10.1016/j.diin.2015.05.003

URL : http://doi.org/10.1016/j.diin.2015.05.003

S. Axelsson, The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000.
DOI : 10.1145/357830.357849

L. Coles-kemp and M. Theoharidou, Insider Threat and Information Security Management, pp.45-71, 2010.
DOI : 10.1007/978-1-4419-7133-3_3

D. L. Costa, M. L. Collins, S. J. Perl, M. J. Albrethsen, G. J. Silowash et al., An ontology for insider threat indicators, 10th International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS) (2015)

U. Flegel, Privacy Compliant Internal Fraud Screening, ISSE 2010 Securing Electronic Business Processes, pp.191-199, 2011.
DOI : 10.1007/978-3-8348-9788-6_19

URL : http://opus.hs-offenburg.de/frontdoor/index/index/docId/624

L. Flynn, C. Huth, R. Trzeciak, and P. Buttles-valdez, Best practices against insider threats for all nations, 2012 Third Worldwide Cybersecurity Summit (WCS), 2013.
DOI : 10.1109/WCS.2012.6780874

T. Goldring, User profiling for intrusion detection in windows nt, Proceedings of the 35th Symposium on the Interface, 2003.

D. Gollmann, I. G. Askoxylakis, H. C. Pöhls, and J. Posegga, Veracity, Plausibility, and Reputation, Proceedings. Lecture Notes in Computer Science, vol.7322, pp.20-28, 2012.
DOI : 10.1007/978-3-642-30955-7_3

F. L. Greitzer and D. A. Frincke, Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation, Insider Threats in Cyber Security, pp.85-113, 2010.
DOI : 10.1007/978-1-4419-7133-3_5

J. Hunker and C. W. Probst, Insiders and insider threats ? an overview of definitions and mitigation techniques, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.4-27, 2011.

J. M. Kaplan, T. Bailey, D. O-'halloran, A. Marcus, and R. Chris, Beyond Cybersecurity: Protecting Your Digital Business, 2015.
DOI : 10.1002/9781119055228

S. Köpsell, R. Wendolsky, and H. Federrath, Revocable Anonymity, International Conference on Emerging Trends in Information and Communication Security (ET- RICS'06, pp.206-220, 2006.
DOI : 10.1007/11766155_15

K. Lakkaraju and A. J. Slagell, Evaluating the utility of anonymized network traces for intrusion detection, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, p.17, 2008.
DOI : 10.1145/1460877.1460899

L. Li and C. N. Manikopoulos, Windows nt one-class masquerade detection, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp.82-87, 2004.

J. Lindemann, Towards Abuse Detection and Prevention in IaaS Cloud Computing, 2015 10th International Conference on Availability, Reliability and Security, 2015.
DOI : 10.1109/ARES.2015.72

E. Lundin and E. Jonsson, Anomaly-based intrusion detection: privacy concerns and other problems, Computer Networks, vol.34, issue.4, pp.623-640, 2000.
DOI : 10.1016/S1389-1286(00)00134-1

M. A. Maloof and G. D. Stephens, elicit: A System for Detecting Insiders Who Violate Need-to-Know, Recent Advances in Intrusion Detection, pp.146-166
DOI : 10.1007/978-3-540-74320-0_8

R. Maxion and T. Townsend, Masquerade Detection Augmented With Error Analysis, IEEE Transactions on Reliability, vol.53, issue.1, pp.124-147, 2004.
DOI : 10.1109/TR.2004.824828

M. Maybury, P. Chase, B. Cheikes, D. Brackney, S. Matzner et al., Analysis and detection of malicious insiders, Tech. rep., DTIC Document, 2005.

K. Michelberg, L. Schive, and N. Pollard, Us cybercrime: Rising risks, reduced readiness ? key findings from the 2014 us state of cybercrime survey (2014), https

P. G. Neumann, Combatting Insider Threats, pp.17-44, 2010.
DOI : 10.1007/978-1-4419-7133-3_2

C. P. Pfleeger, S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop et al., Reflections on the Insider Threat, Insider Attack and Cyber Security, Advances in Information Security, pp.5-16, 2008.
DOI : 10.1007/978-0-387-77322-3_2

C. W. Probst, J. Hunker, D. Gollmann, and M. Bishop, Aspects of Insider Threats, Threats in Cyber Security, Advances in Information Security, pp.1-15, 2010.
DOI : 10.1007/978-1-4419-7133-3_1

M. B. Salem, S. Hershkop, S. J. Stolfo, S. J. Stolfo, S. M. Bellovin et al., A Survey of Insider Attack Detection Research, Insider Attack and Cyber Security, Advances in Information Security, pp.69-90, 2008.
DOI : 10.1007/978-0-387-77322-3_5

M. Schonlau, W. Dumouchel, W. H. Ju, A. F. Karr, M. Theus et al., Computer intrusion: Detecting masquerades, Statistical Science, vol.16, issue.1, pp.58-74, 2001.

V. Shoup, Practical Threshold Signatures, Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp.207-220, 2000.
DOI : 10.1007/3-540-45539-6_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.7629

G. Silowash, D. Cappelli, A. Moore, R. Trzeciak, T. Shimeall et al., Common sense guide to mitigating insider threats, 2012.

L. Spitzner, Honeypots: catching the insider threat In: Computer Security Applications Conference, Proceedings. 19th Annual, pp.170-179, 2003.

S. Zimmermann, Wirtschaftsspionage ? Gefahr im eigenen Haus, p.1, 2015.