1. Patcha A, Park JM (2007) An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput Netw 51(12):3448–3470
2. Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15
3. Greitzer FL, Paulson P, Kangas L, Franklin LR, Edgar TW, Frincke DA (2008) Predictive modelling for insider threat mitigation. Pacific Northwest National Laboratory, Richland, WA, Tech. Rep. PNNL Technical Report PNNL-60737
4. Gritzalis D, Starvou V, Kandias M (2014) Insider threat: enhancing BPM through social media, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
5. Levis AH, Zaidi AK, Rafi MR (2012) Multi-modeling and meta-modeling of human organizations. In: Salvendy G, Karwowski W (eds) Advances in human factors and ergonomics 2012: Proceedings of the 4th AHFE conference 21–25 July 2012, CRC Press