E. Sultan-alneyadi, V. Sithirasenan, and . Muthukkumarasamy, A survey on data leakage prevention systems, J. Netw. Comput. Appl, vol.62, issue.C, pp.137-152, 2016.

A. Sulaiman, F. Amro, D. A. Chiclana, and . Elizondo, Application of fuzzy logic in computer security and forensics, Computational Intelligence for Privacy and Security, vol.394, pp.35-49, 2012.

R. E. Bellman and L. A. Zadeh, Decision-making in a fuzzy environment, Manage. Sci, vol.17, issue.4, pp.141-164, 1970.

R. Chen, A traceability chain algorithm for artificial neural networks using ts fuzzy cognitive maps in blockchain, Future Generation Computer Systems, vol.80, pp.198-210, 2018.

I. Homoliak, F. Toffalini, J. Guarnizo, Y. Elovici, and M. Ochoa, Insight into insiders: A survey of insider threat taxonomies, analysis, modeling, and countermeasures, 2018.

Y. Kaga, M. Fujio, K. Naganuma, K. Takahashi, T. Murakami et al., A secure and practical signature scheme for blockchain based on biometrics, Information Security Practice and Experience -13th International Conference, vol.10701, pp.877-891, 2017.

T. Marwala and B. Xing, Blockchain and artificial intelligence, 2018.

L. Spitzner, Honeypots: Catching the insider threat, Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC '03, p.170, 2003.

S. J. Stolfo, B. Malek, A. D. Salem, and . Keromytis, Fog computing: Mitigating insider data theft attacks in the cloud, Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, SPW '12, pp.125-128, 2012.

H. Xu and R. Tang, Study and improvements for the real-time performance of linux kernel, 3rd International Conference on Biomedical Engineering and Informatics, vol.7, pp.2766-2769, 2010.

K. Zhao, Q. Li, J. Kang, D. Jiang, and L. Hu, Design and implementation of secure auditing system in linux kernel, 2007 International Workshop on AntiCounterfeiting, Security and Identification (ASID), pp.232-236, 2007.