1. Priezkalns E (2018) Global fraud loss survey by cfca (communications fraud control association), Available https://commsrisk.com/a-breakdown-of-the-cfca-fraud-survey-results/2018
2. Mathew S, Petropoulos M, Ngo HQ, Upadhyaya S (2010) A data-centric approach to insider attack detection in database systems. In: Lecture notes in computer science (including subseries Lecture notes in artificial intelligence and lecture notes in bioinformatics), pp 382–401
3. Azad C, Jha VK (2013) Data mining in intrusion detection: a comparative study of methods, types and datasets. Int J Inf Technol Comput Sci 8:75–90
4. Rebecca C, Ling M, Nazli G, David G (2003) Misuse detection for information retrieval systems. CIKM 03:183–190
5. Upadyaya S (2003) Real-time intrusion detction with emphasis on insider attacks, MMM_ACNS. LNCS 2776:82–85