Author of the publication

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection.

, , , and . J. Internet Serv. Inf. Secur., 4 (4): 127-137 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The challenge of detecting sophisticated attacks: Insights from SOC Analysts., , and . ARES, page 55:1-55:9. ACM, (2018)Determining the Veracity of Rumours on Twitter., , , , , , and . SocInfo (1), volume 10046 of Lecture Notes in Computer Science, page 185-205. (2016)A State Machine System for Insider Threat Detection., , , , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 111-129. Springer, (2018)Smart Insiders: Exploring the Threat from Insiders Using the Internet-of-Things., , , , and . SIoT, page 5-14. IEEE Computer Society, (2015)Reaching for Informed Revocation: Shutting Off the Tap on Personal Data., , , and . PrimeLife, volume 320 of IFIP Advances in Information and Communication Technology, page 246-258. Springer, (2009)Nonsense Attacks on Google Assistant and Missense Attacks on Amazon Alexa., , and . ICISSP, page 75-87. SciTePress, (2019)Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements., , , and . PrimeLife, volume 352 of IFIP Advances in Information and Communication Technology, page 271-282. Springer, (2010)Formalising Requirements for a Biobank Case Study Using a Logic for Consent and Revocation., , and . PrimeLife, volume 375 of IFIP Advances in Information and Communication Technology, page 232-244. Springer, (2011)Modeling Advanced Persistent Threats to enhance anomaly detection techniques., , and . JoWUA, 9 (4): 71-102 (2018)Formalising Policies for Insider-threat Detection: A Tripwire Grammar., , , and . JoWUA, 8 (1): 26-43 (2017)