Abstract is missing.
- Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)Andrew Stephen McGough, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis. 1-12 [doi]
- Detecting Insider Threat from Enterprise Social and Online Activity DataGaurang Gavai, Kumar Sricharan, Dave Gunning, Rob Rolleston, John Hanley, Mudita Singhal. 13-20 [doi]
- Modelling Social-Technical Attacks with Timed AutomataNicolas David, Alexandre David, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr. Olesen, Christian W. Probst. 21-28 [doi]
- Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital EvidenceAniello Castiglione, Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Raffaele Pizzolante. 29-39 [doi]
- Mobile App Security Assessment with the MAVeriC Dynamic Analysis ModuleAlessandro Armando, Gianluca Bocci, Gabriele Costa, Rocco Mammoliti, Alessio Merlo, Silvio Ranise, Riccardo Traverso, Andrea Valenza. 41-49 [doi]
- Detecting Insider Threats: Who Is Winning the Game?William R. Claycomb. 51 [doi]
- Compliance Control: Managed Vulnerability Surface in Social-Technological Systems via Signaling GamesWilliam Austin Casey, Quanyan Zhu, Jose Andre Morales, Bud Mishra. 53-62 [doi]
- Secure Power Management Scheme for WSNKun-Lin Tsai, Mengyuan Ye, Fang-Yie Leu. 63-66 [doi]
- SKETURE: A Sketch-based Packet Analysis ToolSherenaz W. Al-Haj Baddar, Alessio Merlo, Mauro Migliardi. 67-70 [doi]
- Towards Insider Threat Detection Using Psychophysiological SignalsYassir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu. 71-74 [doi]
- A Preliminary Cyber Ontology for Insider Threats in the Financial SectorGökhan Kul, Shambhu Upadhyaya. 75-78 [doi]
- Cyber Threats to Industrial Control SystemsKangbin Yim, Aniello Castiglione, Jeong Hyun Yi, Mauro Migliardi, Ilsun You. 79-81 [doi]