Privacy-preserving email forensics, Digital Investigation 14S1742287615000481, the Proceedings of the Fifteenth Annual DFRWS Conference, pp.127-136, 2015. ,
DOI : 10.1016/j.diin.2015.05.003
URL : http://doi.org/10.1016/j.diin.2015.05.003
The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security, vol.3, issue.3, pp.186-205, 2000. ,
DOI : 10.1145/357830.357849
Insider Threat and Information Security Management, pp.45-71, 2010. ,
DOI : 10.1007/978-1-4419-7133-3_3
An ontology for insider threat indicators, 10th International Conference on Semantic Technology for Intelligence, Defense, and Security (STIDS) (2015) ,
Privacy Compliant Internal Fraud Screening, ISSE 2010 Securing Electronic Business Processes, pp.191-199, 2011. ,
DOI : 10.1007/978-3-8348-9788-6_19
URL : http://opus.hs-offenburg.de/frontdoor/index/index/docId/624
Best practices against insider threats for all nations, 2012 Third Worldwide Cybersecurity Summit (WCS), 2013. ,
DOI : 10.1109/WCS.2012.6780874
User profiling for intrusion detection in windows nt, Proceedings of the 35th Symposium on the Interface, 2003. ,
Veracity, Plausibility, and Reputation, Proceedings. Lecture Notes in Computer Science, vol.7322, pp.20-28, 2012. ,
DOI : 10.1007/978-3-642-30955-7_3
Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation, Insider Threats in Cyber Security, pp.85-113, 2010. ,
DOI : 10.1007/978-1-4419-7133-3_5
Insiders and insider threats ? an overview of definitions and mitigation techniques, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.4-27, 2011. ,
Beyond Cybersecurity: Protecting Your Digital Business, 2015. ,
DOI : 10.1002/9781119055228
Revocable Anonymity, International Conference on Emerging Trends in Information and Communication Security (ET- RICS'06, pp.206-220, 2006. ,
DOI : 10.1007/11766155_15
Evaluating the utility of anonymized network traces for intrusion detection, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, p.17, 2008. ,
DOI : 10.1145/1460877.1460899
Windows nt one-class masquerade detection, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, pp.82-87, 2004. ,
Towards Abuse Detection and Prevention in IaaS Cloud Computing, 2015 10th International Conference on Availability, Reliability and Security, 2015. ,
DOI : 10.1109/ARES.2015.72
Anomaly-based intrusion detection: privacy concerns and other problems, Computer Networks, vol.34, issue.4, pp.623-640, 2000. ,
DOI : 10.1016/S1389-1286(00)00134-1
elicit: A System for Detecting Insiders Who Violate Need-to-Know, Recent Advances in Intrusion Detection, pp.146-166 ,
DOI : 10.1007/978-3-540-74320-0_8
Masquerade Detection Augmented With Error Analysis, IEEE Transactions on Reliability, vol.53, issue.1, pp.124-147, 2004. ,
DOI : 10.1109/TR.2004.824828
Analysis and detection of malicious insiders, Tech. rep., DTIC Document, 2005. ,
Us cybercrime: Rising risks, reduced readiness ? key findings from the 2014 us state of cybercrime survey (2014), https ,
Combatting Insider Threats, pp.17-44, 2010. ,
DOI : 10.1007/978-1-4419-7133-3_2
Reflections on the Insider Threat, Insider Attack and Cyber Security, Advances in Information Security, pp.5-16, 2008. ,
DOI : 10.1007/978-0-387-77322-3_2
Aspects of Insider Threats, Threats in Cyber Security, Advances in Information Security, pp.1-15, 2010. ,
DOI : 10.1007/978-1-4419-7133-3_1
A Survey of Insider Attack Detection Research, Insider Attack and Cyber Security, Advances in Information Security, pp.69-90, 2008. ,
DOI : 10.1007/978-0-387-77322-3_5
Computer intrusion: Detecting masquerades, Statistical Science, vol.16, issue.1, pp.58-74, 2001. ,
Practical Threshold Signatures, Advances in Cryptology -EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, pp.207-220, 2000. ,
DOI : 10.1007/3-540-45539-6_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.7629
Common sense guide to mitigating insider threats, 2012. ,
Honeypots: catching the insider threat In: Computer Security Applications Conference, Proceedings. 19th Annual, pp.170-179, 2003. ,
Wirtschaftsspionage ? Gefahr im eigenen Haus, p.1, 2015. ,