Skip to main content
Kent Academic Repository

Browse by Publisher

Group by: Item Type | Date | No Grouping
Number of items: 4.

2017

Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
Format: PDF

2015

McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa, Theodoropoulos, Georgios, Ruck-Keene, Ed and others. (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (KAR id:54143)
Format: PDF
Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070) (KAR id:67510)
Format: PDF

2013

Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020) (KAR id:67521)
Format: PDF
This list was generated on Fri Mar 29 01:02:49 2024 GMT.