<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Jason R.C. Nurse</style></author><author><style face="normal" font="default" size="100%">Oliver Buckley</style></author><author><style face="normal" font="default" size="100%">Philip A. Legg</style></author><author><style face="normal" font="default" size="100%">Michael Goldsmith</style></author><author><style face="normal" font="default" size="100%">Sadie Creese</style></author><author><style face="normal" font="default" size="100%">Gordon R.T. Wright</style></author><author><style face="normal" font="default" size="100%">Monica Whitty</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Understanding Insider Threat: A Framework for Characterising Attacks</style></title><secondary-title><style face="normal" font="default" size="100%">2014 IEEE Security and Privacy Workshops</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><pub-location><style face="normal" font="default" size="100%">San Jose, CA, USA</style></pub-location><pages><style face="normal" font="default" size="100%">214-228</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>