Page 129 - KDU INTERNATIONAL JOURNAL OF CRIMINAL JUSTICE
P. 129
KDU International Journal of Criminal Justice (KDUIJCJ)
Volume I | Issue II| July 2024
Acknowledgment
Firstly, I would like to thank Professor Rohan Gunaratne, Maj S Jayaratne and
lecturers in Faculty of Defence and Strategic Studies of Kotelawala Defence
University for all advices, ideas, moral support and patience in guiding me
throughout this research paper. Finally, I would like to thank all who for
supported me throughout this research paper guiding me in all legal approaches,
helping to make this research paper a success.
References
Cheng, Z., Song, J., & Huang, C. (2018). Behavioral modeling of insider threats
using Bayesian networks. Journal of Information Security and Applications, 41,
23-36.
Al-Fedaghi, S., & Kaabouch, N. (2017). A Bayesian network approach for insider
threat detection. IEEE Systems Journal, 11(3), 1594-1605.
Cook, T., & de Vel, O. (2014). Applying Bayesian networks to detect insider threats.
International Journal of Digital Crime and Forensics, 6(2), 20-34.
Kim, H. W., Park, M., & Kwon, S. (2019). A probabilistic approach to identifying
insider threats using Bayesian networks. Journal of Information Security and
Applications, 49, 102383.
Carin, L., Broomell, S., Desmarais, M., & Murphy, K. (2011). Bayesian modeling
and analysis of insider threats: A tutorial. Statistical Science, 26(2), 176-188.
Ozmen, O., & Yolum, P. (2013). Modeling insider threats using Bayesian networks.
In Proceedings of the IEEE 13th International Conference on Data Mining
Workshops (pp. 528-535).
118