Corporate Insider Threat Detection: Publications
Click here to download all publications in a single bibtex file
@inproceedings{bnlgs2014, title = "Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat", author = "Buckley, Oliver and Nurse, Jason R. C. and Legg, Philip A. and Goldsmith, Michael and Creese, Sadie", year = "2014", booktitle = "Workshop on Socio-Technical Aspects in Security and Trust (STAST) associated with 27th IEEE Computer Security Foundations Symposium (CSF)", publisher = "IEEE", doi = "10.1109/STAST.2014.10", }
@inproceedings{nblgcww2014, title = "Understanding Insider Threat: A Framework for Characterising Attacks", author = "Jason R.C. Nurse and Oliver Buckley and Philip A. Legg and Michael Goldsmith and Sadie Creese and Gordon R.T. Wright and Monica Whitty", year = "2014", booktitle = "Workshop on Research for Insider Threat (WRIT) held as part of the IEEE Computer Society Security and Privacy Workshops (SPW14), in conjunction with the IEEE Symposium on Security and Privacy (SP).", publisher = "IEEE", url = "http://www.sei.cmu.edu/community/writ2014/", doi = "10.1109/SPW.2014.38", }
@inproceedings{nlbawwugc14, title = "A critical reflection on the threat from human insiders - its nature, industry perceptions, and detection approaches", author = "Nurse, Jason R.C. and Legg, Philip A. and Buckley, Oliver and Agrafiotis, Ioannis and Wright, Gordon and Whitty, Monica and Upton, David and Goldsmith, Michael and Creese, Sadie", year = "2014", booktitle = "International Conference on Human Aspects of Information Security, Privacy and Trust at the 16th International Conference on Human-Computer Interaction (HCI)", publisher = "Springer", doi = "10.1007/978-3-319-07620-1_24", }
@article{legg2013mist, title = "Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection", author = "Philip A. Legg, Nick Moffat, Jason R.C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese", year = "2013", issn = "2093-5382", journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications", number = "4", pages = "20-37", url = "http://isyou.info/jowua/papers/jowua-v4n4-2.pdf", volume = "4", }