1. ‘The risk of insider fraud: second annual study’,2013
2. ‘Insiders and insider threats – an overview of definitions and mitigation techniques’;Hunker;Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications,2011
3. Shaw, ED; Stock, HV. ‘Behavioral risk indicators of malicious insider theft of intellectual property: Misreading the writing on the wall’. Symantec, Tech. Report, 2011.
4. ‘Modeling human behavior to anticipate insider attacks’;Greitzer;Journal of Strategic Security,2011
5. Brdiczka, O; Liu, J; Price, B; Shen, J; Patil, A; Chow, R; Bart, E; Ducheneaut, N. ‘Proactive insider threat detection through graph learning and psychological context’. In IEEE Symposium on Security and Privacy Workshops (SPW), 2012.