-
1
-
-
33646162672
-
-
retrieved June 14, 2005
-
G. Killcrece, K.-P. Kossakowski, R. Ruefle, and M. Zajicek, "State of the practice of Computer Security Incident Response Teams (CSIRTs)," accessed from http://www.cert.org/archive/pdf/03tr001.pdf. retrieved June 14, 2005, 2005.
-
(2005)
State of the Practice of Computer Security Incident Response Teams (CSIRTs)
-
-
Killcrece, G.1
Kossakowski, K.-P.2
Ruefle, R.3
Zajicek, M.4
-
2
-
-
34948816818
-
Towards a cyber security reporting system - A quality improvement process
-
September 28-30, Fredrikstad, Norway
-
J. J. Gonzalez, "Towards a Cyber Security Reporting System - A Quality Improvement Process," presented at Twenty Fourth International Conference on Computer Safety, Reliability and Security (SAFECOMP2005), September 28-30, 2005, Fredrikstad, Norway.
-
(2005)
Twenty Fourth International Conference on Computer Safety, Reliability and Security (SAFECOMP2005)
-
-
Gonzalez, J.J.1
-
3
-
-
33646125006
-
Limits to effectiveness in computer security incident response teams (CSIRTs)
-
July 17-21, Boston, MA
-
J. Wiik, J. J. Gonzalez, and K.-P. Kossakowski, "Limits to Effectiveness in Computer Security Incident Response Teams (CSIRTs)," presented at 23rd International Conference of the System Dynamics Society, July 17-21, 2005, Boston, MA.
-
(2005)
23rd International Conference of the System Dynamics Society
-
-
Wiik, J.1
Gonzalez, J.J.2
Kossakowski, K.-P.3
-
4
-
-
0000004295
-
Scripts for group model building
-
D. F. Andersen and G. P. Richardson, "Scripts for group model building," System Dynamics Review, vol. 13(2), pp. 107-129, 1997.
-
(1997)
System Dynamics Review
, vol.13
, Issue.2
, pp. 107-129
-
-
Andersen, D.F.1
Richardson, G.P.2
-
6
-
-
0842349296
-
Collecting and analyzing qualitative data for system dynamics: Methods and models
-
L. F. Luna-Reyes and D. L. Andersen, "Collecting and analyzing qualitative data for system dynamics: Methods and models," System Dynamics Review, vol. 19(4), pp. 271-296, 2003.
-
(2003)
System Dynamics Review
, vol.19
, Issue.4
, pp. 271-296
-
-
Luna-Reyes, L.F.1
Andersen, D.L.2
-
7
-
-
84982719176
-
Teamwork in group model building
-
G. Richardson and D. F. Andersen, "Teamwork in group model building," System Dynamics Review, vol. 11(2), pp. 113-138, 1995.
-
(1995)
System Dynamics Review
, vol.11
, Issue.2
, pp. 113-138
-
-
Richardson, G.1
Andersen, D.F.2
-
10
-
-
33749629899
-
Helping prevent information security risks in the transition to integrated operations
-
J. J. Gonzalez, Y. Qian, F. O. Sveen, and E. Rich, "Helping Prevent Information Security Risks in the Transition to Integrated Operations," Telektronikk, vol. 101(1), pp. 29-37, 2005.
-
(2005)
Telektronikk
, vol.101
, Issue.1
, pp. 29-37
-
-
Gonzalez, J.J.1
Qian, Y.2
Sveen, F.O.3
Rich, E.4
-
11
-
-
0035623034
-
Nobody ever gets credit for fixing defects that didn't happen: Creating and sustaining process improvement
-
N. Repenning and J. Sterman, "Nobody Ever Gets Credit for Fixing Defects that Didn't Happen: Creating and Sustaining Process Improvement," California Management Review, vol. 43(4), pp. 64-88, 2001.
-
(2001)
California Management Review
, vol.43
, Issue.4
, pp. 64-88
-
-
Repenning, N.1
Sterman, J.2
-
12
-
-
43149116934
-
Preliminary system dynamics maps of the insider cyber-threat problem
-
Oxford, UK
-
D. F. Andersen, D. Cappelli, J. J. Gonzalez, M. Mojtahedzadeh, A. Moore, E. Rich, J. M. Sarriegui, T. J. Shimeall, J. Stanton, E. Weaver, and A. Zagonel, "Preliminary System Dynamics Maps of the Insider Cyber-threat Problem," presented at the 22nd International Conference of the System Dynamics Society, 2004, Oxford, UK.
-
(2004)
22nd International Conference of the System Dynamics Society
-
-
Andersen, D.F.1
Cappelli, D.2
Gonzalez, J.J.3
Mojtahedzadeh, M.4
Moore, A.5
Rich, E.6
Sarriegui, J.M.7
Shimeall, T.J.8
Stanton, J.9
Weaver, E.10
Zagonel, A.11
-
13
-
-
32644465248
-
-
retrieved June 15, 2005
-
M. R. Randazzo, M. M. Keeney, E. F. Kowalski, D. M. Cappelli, and A. P. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," accessed from http://www.cert.org/archive/pdf/ bankfin040820. pdf, retrieved June 15, 2005.
-
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.R.1
Keeney, M.M.2
Kowalski, E.F.3
Cappelli, D.M.4
Moore, A.P.5
-
14
-
-
27844543023
-
-
retrieved June 15, 2005
-
M. M. Keeney, E. F. Kowalski, D. M. Cappelli, A. P. Moore, T. J. Shimeall, and S. Rogers, "Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors," accessed from http://www.cert.org/ archive/pdf/insidercross051105.pdf.retrieved June 15, 2005.
-
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.M.1
Kowalski, E.F.2
Cappelli, D.M.3
Moore, A.P.4
Shimeall, T.J.5
Rogers, S.6
|