{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:37Z","timestamp":1750306477665,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DSTL (UK)","award":["DSTLX1000088892"],"award-info":[{"award-number":["DSTLX1000088892"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808783.2808785","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Insider Threats"],"prefix":"10.1145","author":[{"given":"Andrew Stephen","family":"McGough","sequence":"first","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"given":"David","family":"Wall","sequence":"additional","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"given":"John","family":"Brennan","sequence":"additional","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"given":"Georgios","family":"Theodoropoulos","sequence":"additional","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"given":"Ed","family":"Ruck-Keene","sequence":"additional","affiliation":[{"name":"Durham University, Durham, United Kingdom"}]},{"given":"Budi","family":"Arief","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Carl","family":"Gamble","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"John","family":"Fitzgerald","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, United Kingdom"}]},{"given":"Sujeewa","family":"Alwis","sequence":"additional","affiliation":[{"name":"Insighlytics Ltd, York, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_47"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1413140.1413158"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.109"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.110"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.4.2.2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"M.\n      Kandias A.\n      Mylonas N.\n      Virvilis M.\n      Theoharidou and \n      D.\n      Gritzalis\n  . \n  An insider threat prediction model\n  . In S. Katsikas J. Lopez and M. Soriano editors Trust Privacy\n   and Security in Digital Business volume \n  6264\n   of \n  Lecture Notes in Computer Science pages \n  26\n  --\n  37\n  . \n  Springer Berlin Heidelberg 2010\n  .   M. Kandias A. Mylonas N. Virvilis M. Theoharidou and D. Gritzalis. An insider threat prediction model. In S. Katsikas J. Lopez and M. Soriano editors Trust Privacy and Security in Digital Business volume 6264 of Lecture Notes in Computer Science pages 26--37. Springer Berlin Heidelberg 2010.","DOI":"10.1007\/978-3-642-15152-1_3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.10.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_24"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/978-3-642-23184-1_3","volume-title":"Advances in Data Mining. Applications and Theoretical Aspects","author":"Pauwels E.","year":"2011","unstructured":"E. Pauwels and O. Ambekar . One class classification for anomaly detection: Support vector data description revisited . In P. Perner, editor, Advances in Data Mining. Applications and Theoretical Aspects , volume 6870 of Lecture Notes in Computer Science , pages 25 -- 39 . Springer Berlin Heidelberg , 2011 . E. Pauwels and O. Ambekar. One class classification for anomaly detection: Support vector data description revisited. In P. Perner, editor, Advances in Data Mining. Applications and Theoretical Aspects, volume 6870 of Lecture Notes in Computer Science, pages 25--39. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956438"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.548178"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/211359"},{"key":"e_1_3_2_1_17_1","volume-title":"April","author":"Wall D.","year":"2013","unstructured":"D. Wall . Enemies within: redefining the insider threat in organizational security policy. Security journal., 26(2):107--124 , April 2013 . D. Wall. Enemies within: redefining the insider threat in organizational security policy. Security journal., 26(2):107--124, April 2013."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808783.2808785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808783.2808785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:14Z","timestamp":1750225694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808783.2808785"}},"subtitle":["Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware)"],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":17,"alternative-id":["10.1145\/2808783.2808785","10.1145\/2808783"],"URL":"https:\/\/doi.org\/10.1145\/2808783.2808785","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}