1 | -- | 3 | Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai. Addressing Insider Threats and Information Leakage |
4 | -- | 27 | Jeffrey Hunker, Christian W. Probst. Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques |
28 | -- | 49 | Andrew P. Moore, Dawn M. Cappelli, Thomas C. Caron, Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak. A Preliminary Model of Insider Theft of Intellectual Property |
50 | -- | 62 | Shinsaku Kiyomoto, Keith M. Martin. Model for a Common Notion of Privacy Leakage on Public Database |
63 | -- | 74 | Carol J. Fung. Collaborative Intrusion Detection Networks and Insider Attacks |
75 | -- | 92 | Wolter Pieters. Representing Humans in System Security Models: An Actor-Network Approach |
93 | -- | 102 | Philip Nobles, Shahid Ali, Howard Chivers. Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection |
103 | -- | 120 | Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang. Detecting Anomalies in Active Insider Stepping Stone Attacks |