A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications

Shuyuan Mary Ho, Hwajung Lee. A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications. JoWUA, 3(1/2):82-98, 2012. [doi]

@article{HoL12-3,
  title = {A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications},
  author = {Shuyuan Mary Ho and Hwajung Lee},
  year = {2012},
  url = {http://isyou.info/jowua/papers/jowua-v3n12-6.pdf},
  researchr = {https://researchr.org/publication/HoL12-3},
  cites = {0},
  citedby = {0},
  journal = {JoWUA},
  volume = {3},
  number = {1/2},
  pages = {82-98},
}