Corporate Insider Threat Detection: Publications
Journal papers
-
[1]
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Sadie Creese Philip A. Legg Nick Moffat Jason R.C. Nurse Jassim Happa Ioannis Agrafiotis Michael Goldsmith
In Journal of Wireless Mobile Networks‚ Ubiquitous Computing‚ and Dependable Applications. Vol. 4. No. 4. Pages 20−37. 2013.
Details about Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | BibTeX data for Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection | Download (pdf) of Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection
Conference papers
-
[1]
Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat
Oliver Buckley‚ Jason R. C. Nurse‚ Philip A. Legg‚ Michael Goldsmith and Sadie Creese
In Workshop on Socio−Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF). IEEE. 2014.
Details about Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | BibTeX data for Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | Download (pdf) of Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat | DOI (10.1109/STAST.2014.10)
-
[2]
Understanding Insider Threat: A Framework for Characterising Attacks
Jason R.C. Nurse‚ Oliver Buckley‚ Philip A. Legg‚ Michael Goldsmith‚ Sadie Creese‚ Gordon R.T. Wright and Monica Whitty
In Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14)‚ in conjunction with the IEEE Symposium on Security and Privacy (SP).. IEEE. 2014.
Details about Understanding Insider Threat: A Framework for Characterising Attacks | BibTeX data for Understanding Insider Threat: A Framework for Characterising Attacks | Download of Understanding Insider Threat: A Framework for Characterising Attacks | DOI (10.1109/SPW.2014.38) | Link to Understanding Insider Threat: A Framework for Characterising Attacks
-
[3]
A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches
Jason R.C. Nurse‚ Philip A. Legg‚ Oliver Buckley‚ Ioannis Agrafiotis‚ Gordon Wright‚ Monica Whitty‚ David Upton‚ Michael Goldsmith and Sadie Creese
In International Conference on Human Aspects of Information Security‚ Privacy and Trust at the 16th International Conference on Human−Computer Interaction (HCI). Springer. 2014.
Details about A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | BibTeX data for A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | Download (pdf) of A critical reflection on the threat from human insiders − its nature‚ industry perceptions‚ and detection approaches | DOI (10.1007/978-3-319-07620-1_24)