Attribute-based access control, IEEE Computer, vol.48, issue.2, pp.85-88, 2015. ,
Common sense guide to mitigating insider threats, 2012. ,
Mining likely properties of access control policies via association rule mining, Data and Applications Security and Privacy, pp.193-208, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-01056688
Detecting and resolving policy misconfigurations in access-control systems, ACM Trans. Inf. Syst. Secur, vol.14, issue.1, p.28, 2011. ,
Role-based profile analysis for scalable and accurate insider-anomaly detection, Proceedings of International Conference on Performance, Computing, and Communications, p.7, 2006. ,
Elicit: A system for detecting insiders who violate need-to-know, Recent Advances in Intrusion Detection, pp.146-166, 2007. ,
Caught in the act of an insider attack: Detection and assessment of insider threat, Proceedings of International Symposium on Technologies for Homeland Security, pp.1-6, 2015. ,
Behavior Analysis in the Medical Sector: Theory and Practice, Proceedings of Symposium on Applied Computing, 2018. ,
Applying role based access control and genetic algorithms to insider threat detection, Proceedings of the Annual Southeast Regional Conference, pp.790-791, 2006. ,
DOI : 10.1145/1185448.1185638
A hybrid framework for data loss prevention and detection, Proceedings of IEEE Security and Privacy Workshops, pp.324-333, 2016. ,
DOI : 10.1109/spw.2016.24
A network access control mechanism based on behavior profiles, Proceedings of Annual Computer Security Applications Conference, pp.3-12, 2009. ,
DOI : 10.1109/acsac.2009.10
URL : https://academiccommons.columbia.edu/doi/10.7916/D8NP2DH8/download
Adaptive identity and access management contextual data based policies, EURASIP Journal on Information Security, vol.2016, issue.1, p.19, 2016. ,
DOI : 10.1186/s13635-016-0043-2
URL : https://jis-eurasipjournals.springeropen.com/track/pdf/10.1186/s13635-016-0043-2
A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies, IEEE Transactions on Software Engineering, 2017. ,
Random forests, Machine learning, vol.45, issue.1, pp.5-32, 2001. ,
One-class classification: Concept-learning in the absence of counter-examples, 2001. ,
Generating production rules from decision trees, Proceedings of International Joint Conference on Artificial Intelligence, pp.304-307, 1987. ,
Interpretable models from distributed data via merging of decision trees, Proceedings of Symposium on Computational Intelligence and Data Mining, pp.1-9, 2013. ,
Novelty detection with application to data streams, Intelligent Data Analysis, vol.13, issue.3, pp.405-422, 2009. ,
DOI : 10.3233/ida-2009-0373
Role-based differentiation for insider detection algorithms, Proceedings of Workshop on Insider Threats, pp.55-62, 2010. ,
DOI : 10.1145/1866886.1866897
Adversarial machine learning, Proceedings of Workshop on Security and Artificial Intelligence, pp.43-58, 2011. ,