{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T15:39:20Z","timestamp":1725637160250},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746709","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T15:29:46Z","timestamp":1232119786000},"page":"703-709","source":"Crossref","is-referenced-by-count":1,"title":["Performance analysis of an insider threat mitigation model"],"prefix":"10.1109","author":[{"given":"Qutaibah","family":"Althebyan","sequence":"first","affiliation":[]},{"given":"Brajendra","family":"Panda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Insider Threat Study Computer System Sabotage in Critical Infrastructure Sectors","year":"2005","author":"keeney","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(01)00209-7"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493444"},{"year":"0","key":"1"},{"key":"7","article-title":"a knowledge-based bayesian model for analyzing a system after an insider attack","author":"althebyan","year":"2008","journal-title":"IFIP 23rd International Information Security Conference"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2007.381939"},{"journal-title":"Information security industry survey (online)","year":"2001","author":"briney","key":"5"},{"key":"4","article-title":"detecting the misappropriation of sensitive information through bottleneck monitoring","author":"goan","year":"2004","journal-title":"Proceedings of the Workshop on Secure Knowledge Management"},{"key":"9","article-title":"knowledge extraction and management for insider threat mitigation","author":"althebyan","year":"2008","journal-title":"Proceedings of the 6th International Workshop on Security in Information Systems"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00052-3"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746709.pdf?arnumber=4746709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:53:49Z","timestamp":1489766029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746709\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746709","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}