1. J. R. Nurse , O. Buckley , P. A. Legg , M. Goldsmith , S. Creese , G. R. Wright , and M. Whitty , “ Understanding insider threat: A framework for characterising attacks,” in 2014 IEEE security and privacy workshops. IEEE , 2014 , pp. 214– 228 . J. R. Nurse, O. Buckley, P. A. Legg, M. Goldsmith, S. Creese, G. R. Wright, and M. Whitty, “Understanding insider threat: A framework for characterising attacks,” in 2014 IEEE security and privacy workshops. IEEE, 2014, pp. 214–228.
2. Detecting and Preventing Cyber Insider Threats: A Survey
3. Prediction of human error using eye movements patterns for unintentional insider threat detection
4. Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data;Azaria A.;IEEE Transactions on Computational Social Systems
5. vol. 1 , no. 2 , pp. 135– 155 , 2014 . vol. 1, no. 2, pp. 135–155, 2014.