Skip to main content
Kent Academic Repository

Browse by Publisher

Group by: Item Type | Date | No Grouping
Number of items: 4.
Nurse, Jason R. C., Bertino, Elisa (2017) Guest editorial: Insider threat solutions - moving from concept to reality. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 8 (1). pp. 1-3. ISSN 2093-5374. (doi:10.22667/JOWUA.2017.03.31.001) (KAR id:67469)
Format: PDF
McGough, Andrew Stephen, Arief, Budi, Gamble, Carl, Wall, David, Brennan, John, Fitzgerald, John, van Moorsel, Aad, Alwis, Sujeewa, Theodoropoulos, Georgios, Ruck-Keene, Ed and others. (2015) Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 6 (4). pp. 3-46. ISSN 2093-5374. E-ISSN 2093-5382. (KAR id:54143)
Format: PDF
Nurse, Jason R. C., Erola, Arnau, Goldsmith, Michael, Creese, Sadie (2015) Investigating the leakage of sensitive personal and organisational information in email headers. Journal of Internet Services and Information Security, 5 (1). pp. 70-84. ISSN 2182-2069. E-ISSN 2182-2077. (doi:10.22667/JISIS.2015.02.31.070) (KAR id:67510)
Format: PDF
Legg, Philip A., Moffat, Nick, Nurse, Jason R. C., Happa, Jassim, Agrafiotis, Ioannis, Goldsmith, Michael, Creese, Sadie (2013) Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4 (4). pp. 20-37. ISSN 2093-5374. E-ISSN 2093-5382. (doi:10.22667/JOWUA.2013.12.31.020) (KAR id:67521)
Format: PDF
This list was generated on Wed Apr 24 01:50:28 2024 BST.