1. A flexible data acquisition system for storing the interactions on mashup user interfaces;Fernández-García;Comput Stand Interfaces,2018
2. Analytic approaches to detect insider threats;Software Engineering Institute,2015
3. The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud);Cappelli,2012
4. Database security-concepts, approaches, and challenges;Bertino;IEEE Trans Dependable Secure Comput,2005
5. Motivation and opportunity based model to reduce information security insider threats in organisations;Safa;J Inf Secur Appl,2018