{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T20:45:16Z","timestamp":1770583516807,"version":"3.49.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_16","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"178-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Probabilistic Analysis Framework for Malicious Insider Threats"],"prefix":"10.1007","author":[{"given":"Taolue","family":"Chen","sequence":"first","affiliation":[]},{"given":"Florian","family":"Kamm\u00fcller","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Nemli","sequence":"additional","affiliation":[]},{"given":"Christian W.","family":"Probst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Axelrad, E.T., Sticha, P.J., Brdiczka, O., Shen, J.: A bayesian network model for predicting insider threats. In: 2013 IEEE Security and Privacy Workshops, pp. 82\u201389. IEEE Computer Society, Los Alamitos (2013)","DOI":"10.1109\/SPW.2013.35"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Boender, J., Ivanova, M.G., Kamm\u00fcller, F., Primiero, G.: Modeling human behaviour with higher order logic: Insider threats. In: STAST 2014. IEEE (2014). co-located with CSF\u201914 in the Vienna Summer of Logic","DOI":"10.1109\/STAST.2014.13"},{"key":"16_CR3","volume-title":"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering","author":"DM Cappelli","year":"2012","unstructured":"Cappelli, D.M., Moore, A.P., Trzeciak, R.F.: The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). SEI Series in Software Engineering, 1st edn. Addison-Wesley Professional, Boston (2012)","edition":"1"},{"key":"16_CR4","volume-title":"Learning in Graphical Models","author":"D Heckerman","year":"1999","unstructured":"Heckerman, D.: A tutorial on learning with bayesian networks. In: Jordan, M. (ed.) Learning in Graphical Models. MIT Press, Cambridge (1999)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Kissel, R.: Glossary of key information security terms. Technical report NISTIR 7298 Revision 2, National Institute of Standards and Technology (2013)","DOI":"10.6028\/NIST.IR.7298r2"},{"key":"16_CR6","volume-title":"Probabilistic Graphical Models - Principles and Techniques","author":"D Koller","year":"2009","unstructured":"Koller, D., Friedman, N.: Probabilistic Graphical Models - Principles and Techniques. MIT Press, Cambridge (2009)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-3-319-12601-2_9","volume-title":"Decision and Game Theory for Security","author":"A Lenin","year":"2014","unstructured":"Lenin, A., Buldas, A.: Limiting adversarial budget in quantitative security assessment. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 155\u2013174. Springer, Heidelberg (2014)"},{"key":"16_CR8","unstructured":"Nemli, I.: Using acklaim and prism to model and analyse insider threats. Master\u2019s thesis, DTU Copenhagen (2015). \n                      http:\/\/www2.imm.dtu.dk\/pubdb\/views\/edoc_download.php\/6864\/pdf"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Nurse, J.R.C., Buckley, O., Legg, P.A., Goldsmith, M., Creese, S., Wright, G.R.T., Whitty, M.: Understanding insider threat: a framework for characterising attacks. In: WRIT 2014. IEEE (2014)","DOI":"10.1109\/SPW.2014.38"},{"issue":"4","key":"16_CR10","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.istr.2008.10.012","volume":"13","author":"CW Probst","year":"2008","unstructured":"Probst, C.W., Hansen, R.R.: An extensible analysable system model. Inf. Secur. Tech. Rep. 13(4), 235\u2013246 (2008)","journal-title":"Inf. Secur. Tech. Rep."}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:17:03Z","timestamp":1583507823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}