{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T08:19:31Z","timestamp":1765354771956,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T00:00:00Z","timestamp":1605830400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["830929"],"award-info":[{"award-number":["830929"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010664","name":"H2020 Future and Emerging Technologies","doi-asserted-by":"publisher","award":["832735"],"award-info":[{"award-number":["832735"]}],"id":[{"id":"10.13039\/100010664","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,20]]},"DOI":"10.1145\/3437120.3437336","type":"proceedings-article","created":{"date-parts":[[2021,3,4]],"date-time":"2021-03-04T22:12:12Z","timestamp":1614895932000},"page":"340-345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["The Insider Threat: Reasons, Effects and Mitigation Techniques"],"prefix":"10.1145","author":[{"given":"Dimitrios","family":"Tsiostas","sequence":"first","affiliation":[{"name":"University of West of Attica, Greece"}]},{"given":"George","family":"Kittes","sequence":"additional","affiliation":[{"name":"University of West of Attica, Greece"}]},{"given":"Nestoras","family":"Chouliaras","sequence":"additional","affiliation":[{"name":"University of West of Attica, Greece"}]},{"given":"Ioanna","family":"Kantzavelou","sequence":"additional","affiliation":[{"name":"University of West of Attica, Greece"}]},{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[{"name":"De Montfort University, United Kingdom"}]},{"given":"Christos","family":"Douligeris","sequence":"additional","affiliation":[{"name":"University of Piraeus, Greece"}]},{"given":"Vasileios","family":"Vlachos","sequence":"additional","affiliation":[{"name":"Univertisty of Thessaly, Greece"}]}],"member":"320","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Cost of Insider Threats Global Report: Proofpoint US. https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/2020-cost-of-insider-threats  2020. Cost of Insider Threats Global Report: Proofpoint US. https:\/\/www.proofpoint.com\/us\/resources\/threat-reports\/2020-cost-of-insider-threats"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/app10103660"},{"volume-title":"echnical Report. tech. rep.","author":"Asen Alex","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(20)30010-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919982"},{"key":"e_1_3_2_1_8_1","unstructured":"[\n  8\n  ]  Daniel Costa.2017. https:\/\/insights.sei.cmu.edu\/insider-threat\/2017\/03\/cert-definition-of-insider-threat---updated.html  [8] Daniel Costa.2017. https:\/\/insights.sei.cmu.edu\/insider-threat\/2017\/03\/cert-definition-of-insider-threat---updated.html"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Harry Doubleday Leandros Maglaras and Helge Janicke. 2016. SSH honeypot: building deploying and analysis. (2016).  Harry Doubleday Leandros Maglaras and Helge Janicke. 2016. SSH honeypot: building deploying and analysis. (2016).","DOI":"10.14569\/IJACSA.2016.070518"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/IConAC.2015.7313979"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.002"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Bil Hallaq Andrew Nicholson Richard Smith Leandros Maglaras Helge Janicke and Kevin Jones. 2018. CYRAN: a hybrid cyber range for testing security on ICS\/SCADA systems. In Cyber Security and Threats: Concepts Methodologies Tools and Applications. IGI Global 622\u2013637.  Bil Hallaq Andrew Nicholson Richard Smith Leandros Maglaras Helge Janicke and Kevin Jones. 2018. CYRAN: a hybrid cyber range for testing security on ICS\/SCADA systems. In Cyber Security and Threats: Concepts Methodologies Tools and Applications. IGI Global 622\u2013637.","DOI":"10.4018\/978-1-5225-5634-3.ch033"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504335.2504350"},{"volume-title":"Strategic innovative marketing and tourism","author":"Maglaras Leandros","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","article-title":"A real time OCSVM intrusion detection module with low overhead for SCADA systems","volume":"3","author":"Maglaras A","year":"2014","journal-title":"International Journal of Advanced Research in Artificial Intelligence (IJARAI)"},{"key":"e_1_3_2_1_17_1","unstructured":"Guerrino Mazzarolo and Anca\u00a0Delia Jurcut. 2019. Insider threats in Cyber Security: The enemy within the gates. arXiv preprint arXiv:1911.09575(2019).  Guerrino Mazzarolo and Anca\u00a0Delia Jurcut. 2019. Insider threats in Cyber Security: The enemy within the gates. arXiv preprint arXiv:1911.09575(2019)."},{"key":"e_1_3_2_1_18_1","unstructured":"B Obama. 2012. National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs. Office of the Press Secretary(2012) 1.  B Obama. 2012. National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs. Office of the Press Secretary(2012) 1."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2012.1"}],"event":{"name":"PCI 2020: 24th Pan-Hellenic Conference on Informatics","acronym":"PCI 2020","location":"Athens Greece"},"container-title":["24th Pan-Hellenic Conference on Informatics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437120.3437336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437120.3437336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:30Z","timestamp":1750197810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437120.3437336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,20]]},"references-count":17,"alternative-id":["10.1145\/3437120.3437336","10.1145\/3437120"],"URL":"https:\/\/doi.org\/10.1145\/3437120.3437336","relation":{},"subject":[],"published":{"date-parts":[[2020,11,20]]},"assertion":[{"value":"2021-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}