| 0 | -- | 0 | Paul J. Sticha, Tirso E. Diaz, Elise T. Axelrad, Sean D. Vermillion, Dennis M. Buede. Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling |
| 0 | -- | 0 | Adam D. Williams, Shannon N. Abbott, Nathan Shoman, William S. Charlton. Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation |
| 0 | -- | 0 | . Introduction to the Special Issue on Insider Threats |
| 0 | -- | 0 | Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg. Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange |
| 0 | -- | 0 | Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi. Privacy-aware Character Pattern Matching over Outsourced Encrypted Data |
| 0 | -- | 0 | Panpan Zheng, Shuhan Yuan, Xintao Wu. Using Dirichlet Marked Hawkes Processes for Insider Threat Detection |
| 0 | -- | 0 | Ephraim Zimmer, Christian Burkert, Hannes Federrath. Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders |