1. Design and analysis of knowledge-base centric insider threat models;Althebyan,2008
2. Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability;Althebyan,2015
3. That ‘Internet of Things’ thing;Ashton;RFiD J.,2009
4. Internet of things: applications and challenges in technology and standardization;Bandyopadhyay;Wireless Personal Commun,2011
5. Position: insider is relative;Bishop,2005