1. A framework for understanding and predicting insider attacks
2. A Survey of Insider Attack Detection Research
3. Chinchani R. Iyer A. Ngo H.Q. Upadhyaya S.: ‘Towards a theory of insider threat assessment’.Int. Conf. on Dependable Systems and Networks Los Alamitos Yokohama Japan June–July2005 pp.108–117
4. Spitzner L.: ‘Honeypots: catching the insider threat’.19th Annual Computer Security Applications Conf. (ACSAC 2003) Los Alamitos Las Vegas USA December2003 pp.170–179
5. Laney C.R. Van der Linden J. Thomas P.: ‘Evolution of aspects for legacy system security’.AOSD Workshop on Dynamic Aspects AOSDSEC'04 Lancaster UK March2004 pp.1–7