M. Bishop, D. Gollmann, J. Hunker, and C. Probst. Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)
C. Probst, J. Hunker, M. Bishop, and D. Gollmann. Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)
M. Bishop, L. Coles-Kemp, D. Gollmann, J. Hunker, and C. Probst. Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)
M. Bishop, L. Coles-Kemp, D. Gollmann, J. Hunker, and C. Probst. Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)