“…In literature, researchers have worked on other security issues like outside malicious attacks, access control issues, network breaches, data provenance, resource exhaustion, consistency management, etc. However, much less work has been proposed on anticipating insider attacks [1,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23], which is the primary objective of this study.…”