These are the sources and citations used to research Steve Dissertation. This bibliography was generated on Cite This For Me on

  • Journal

    Legg, P. A., Buckley, O., Goldsmith, M. and Creese, S.

    Automated Insider Threat Detection System Using User and Role-Based Profile Assessment

    2017 - IEEE Systems Journal

    In-text: (Legg et al., 2017)

    Your Bibliography: Legg, P., Buckley, O., Goldsmith, M. and Creese, S. (2017). Automated Insider Threat Detection System Using User and Role-Based Profile Assessment. IEEE Systems Journal, 11(2), pp.503-512.

  • Journal

    Sarkar, A., Kohler, S., Ludascher, B. and Bishop, M.

    Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes

    2017 - IEEE Systems Journal

    In-text: (Sarkar et al., 2017)

    Your Bibliography: Sarkar, A., Kohler, S., Ludascher, B. and Bishop, M. (2017). Insider Attack Identification and Prevention in Collection-Oriented Dataflow-Based Processes. IEEE Systems Journal, 11(2), pp.522-533.

  • Journal

    Ivanova, M. G., Probst, C. W., Hansen, R. R. and Kammuller, F.

    Externalising Behaviour for Analysing System Models

    2013 - Journal of Internet Services and Information Security (JISIS)

    In-text: (Ivanova et al., 2013)

    Your Bibliography: Ivanova, M., Probst, C., Hansen, R. and Kammuller, F. (2013). Externalising Behaviour for Analysing System Models. Journal of Internet Services and Information Security (JISIS), [online] 3(3/4)(3). Available at: https://research.utwente.nl/en/publications/externalizing-behaviour-for-analysing-system-models [Accessed 12 Dec. 2017].

  • Journal

    Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D.

    Business Process Modeling for Insider Threat Monitoring and Handling

    2014 - 11th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2014

    In-text: (Stavrou et al., 2014)

    Your Bibliography: Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D. (2014). Business Process Modeling for Insider Threat Monitoring and Handling. 11th International Conference on Trust, Privacy, and Security in Digital Business, TrustBus 2014. [online] Available at: https://www.scopus.com/record/display.uri?eid=2-s2.0-84906777219&origin=inward&txGid=c2ed7818c458e82cf6179e5e403ac4e5 [Accessed 1 Jan. 2018].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Super fast and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use our extensive Premium features (Plagiarism checks, Word Add On...)
  • ✔ Create and edit multiple bibliographies
Join