{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:09:53Z","timestamp":1769728193739,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808783.2808792","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"71-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Towards Insider Threat Detection Using Psychophysiological Signals"],"prefix":"10.1145","author":[{"given":"Yassir","family":"Hashem","sequence":"first","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Hassan","family":"Takabi","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Mohammad","family":"GhasemiGol","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas, Denton, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966916"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.37"},{"key":"e_1_3_2_1_3_1","unstructured":"Cybercrime: Protecting against the growing threat - Events and Trends vol. 256 2012.  Cybercrime: Protecting against the growing threat - Events and Trends vol. 256 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"Inc., 2013","author":"AlgoSec","year":"2013"},{"key":"e_1_3_2_1_5_1","unstructured":"New Market Research - SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity.\" Federal and Government Discussions. N.p. n.d. Web. 25 Mar. 2015. https:\/\/thwack.solarwinds.com  New Market Research - SolarWinds Survey Investigates Insider Threats to Federal Cybersecurity.\" Federal and Government Discussions. N.p. n.d. Web. 25 Mar. 2015. https:\/\/thwack.solarwinds.com"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-77322-3_5"},{"issue":"1","key":"e_1_3_2_1_7_1","first-page":"4","article-title":"Insiders and insider threats an overview of definitions and mitigation techniques","volume":"2","author":"Hunker J.","year":"2011","journal-title":"Journal of Wireless Mobile Network ,Ubiquitous Computing, and Dependable Applications"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2012.309"},{"key":"e_1_3_2_1_9_1","unstructured":"\"Emotiv Systems \" https:\/\/emotiv.com\/ {last accessed: July 20 2015}.  \"Emotiv Systems \" https:\/\/emotiv.com\/ {last accessed: July 20 2015}."},{"key":"e_1_3_2_1_10_1","unstructured":"Jolliffe I. (2002). Principal component analysis. John Wiley & Sons Ltd.  Jolliffe I. (2002). Principal component analysis. John Wiley & Sons Ltd."},{"key":"e_1_3_2_1_11_1","unstructured":"Vapnik V. (2013). The nature of statistical learning theory. Springer Science & Business Media.  Vapnik V. (2013). The nature of statistical learning theory. Springer Science & Business Media."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808783.2808792","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808783.2808792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:14Z","timestamp":1750225694000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808783.2808792"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":11,"alternative-id":["10.1145\/2808783.2808792","10.1145\/2808783"],"URL":"https:\/\/doi.org\/10.1145\/2808783.2808792","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}