1. Protecting information from insiders: although organizations are making strides in protecting their sensitive information from outside threats, reports show they often are failing to protect it from the much greater threats posed by their own employees;Swartz N.;Inf Manage J,2007
2. A survey of intrusion detection and prevention systems
3. Gartner. Myths about insider threat management. 2019 [accessed 2020 Feb]. https://www.gartner.com/en/documents/3947311/5-myths-about-insider-threat-management.
4. Ponemon. Cost of insider threat: global. 2018 [accessed 2020 Feb]. https://www.observeit.com/cost-of-insider-threats/.
5. Anomaly detection methods in wired networks: a survey and taxonomy