1 | -- | 3 | Jason R. C. Nurse, Elisa Bertino. Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality |
4 | -- | 25 | Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems |
26 | -- | 43 | Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese. Formalising Policies for Insider-threat Detection: A Tripwire Grammar |
44 | -- | 78 | Florian Kammüller, Manfred Kerber, Christian W. Probst. Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation |
79 | -- | 100 | Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, Marco Vallini. A formal approach for network security policy validation |