1 | -- | 2 | Ilsun You. Editorial |
3 | -- | 46 | Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene. Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software |
47 | -- | 63 | Gaurang Gavai, Kumar Sricharan, Dave Gunning, John Hanley, Mudita Singhal, Rob Rolleston. Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data |
64 | -- | 85 | Gökhan Kul, Shambhu J. Upadhyaya. Towards a Cyber Ontology for Insider Threats in the Financial Sector |
86 | -- | 98 | Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong Je Cho, Sangchul Han, Minkyu Park. Effects of Code Obfuscation on Android App Similarity Analysis |