1. Alvarez, M. (2015). Battling security threats from within your organization. In: Research Report, IBM Security.
2. Angeletou, S., Rowe, M., & Alani, H. (2011). Modelling and analysis of user behaviour in online communities, (pp. 35–50). Berlin Heidelberg: Springer.
3. Anicic, D., Fodor, P., Rudolph, S., Stuhmer, R., Stojanovic, N., & Studer, R. (2010). A rule-based language for complex event processing and reasoning. In Web reasoning and rule systems: Fourth International Conference (pp. 42–57). Berlin Heidelberg: Springer.
4. Arasu, A., Babu, S., & Widom, J. (2006). The cql continuous query language: semantic foundations and query execution. The International Journal on Very Large Data Bases, 15(2), 121–142.
5. Aztiria, A., Augusto, J.C., Basagoiti, R., Izaguirre, A., & Cook, D.J. (2013). Learning frequent behaviors of the users in intelligent environments. IEEE Transactions on Systems. Man and Cybernetics, 43(6), 1265–1278.