-
1
-
-
38949196301
-
-
DoD Office of the Inspector General, DoD Management of Information Assurance Efforts to Protect Automated Information Systems, tech. report no. PO 97-049, US Dept. of Defense, Sept. 1997.
-
DoD Office of the Inspector General, DoD Management of Information Assurance Efforts to Protect Automated Information Systems, tech. report no. PO 97-049, US Dept. of Defense, Sept. 1997.
-
-
-
-
2
-
-
2342472285
-
Constructivism: The Career and Technical Education Perspective
-
P.E. Doolittle and W.G. Camp, "Constructivism: The Career and Technical Education Perspective," J. Vocational and Technical Education, vol. 16, no. 1, 1999; http://scholar.lib.vt.edu/ejouruals/JVTE/ v16n1/doolittle.html.
-
(1999)
J. Vocational and Technical Education
, vol.16
, Issue.1
-
-
Doolittle, P.E.1
Camp, W.G.2
-
3
-
-
38949106468
-
-
F.L. Greitzer, D.J. Pond, and M. Jannotta, Scenario-Based Training on Human Errors Contributing to Security Incidents, Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/IT-SEC 04), 2004; http://ntsa.metapress.com/app/home/contribution.asp?referrer= parent&backto=issue,130,174;journal,4,8;linkingpublicatiouresults,1:113340, 1.
-
F.L. Greitzer, D.J. Pond, and M. Jannotta, "Scenario-Based Training on Human Errors Contributing to Security Incidents," Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/IT-SEC 04), 2004; http://ntsa.metapress.com/app/home/contribution.asp?referrer= parent&backto=issue,130,174;journal,4,8;linkingpublicatiouresults,1:113340, 1.
-
-
-
-
4
-
-
38949168753
-
Learning to Pull the Thread: Application of Guided-Discovery Principles to the Inquiry Process
-
I/ ITSEC 05
-
F.L. Greitzer et al., "Learning to Pull the Thread: Application of Guided-Discovery Principles to the Inquiry Process," Proc. Interservice/Industry Training, Simulation, and Education Conf. (I/ ITSEC 05), 2005;www.simsysinc.com/IITSEC/ED2005.htm#_Toc118714554.
-
(2005)
Proc. Interservice/Industry Training, Simulation, and Education Conf
-
-
Greitzer, F.L.1
-
5
-
-
36448952741
-
-
F.L. Greitzer, O.A. Kuchar, and K. Huston, Cognitive Science Implications for Enhancing Training Effectiveness in a Serious Gaming Context, ACM J. Educational Resources in Computing, 7, no. 3, Article 2, August 2007; http://portal.acm.org/citation.cfm?id=1281320. 1281322&coll=&dl=ACM&idx=J814&part=journal&WantType= Journals&-title= Journal%20ou%20Educational%20Resources%20in%20Computing%20(JERIC).
-
F.L. Greitzer, O.A. Kuchar, and K. Huston, "Cognitive Science Implications for Enhancing Training Effectiveness in a Serious Gaming Context," ACM J. Educational Resources in Computing, vol. 7, no. 3, Article 2, August 2007; http://portal.acm.org/citation.cfm?id=1281320. 1281322&coll=&dl=ACM&idx=J814&part=journal&WantType= Journals&-title= Journal%20ou%20Educational%20Resources%20in%20Computing%20(JERIC).
-
-
-
-
6
-
-
38949180891
-
Predictive Adaptive Classification Model for Analysis and Notification: Internal Threat
-
PNNL-16713, Pacific Northwest National Lab, 2007
-
F.L. Greitzer et al., Predictive Adaptive Classification Model for Analysis and Notification: Internal Threat, tech. report PNNL-16713, Pacific Northwest National Lab., 2007.
-
tech. report
-
-
Greitzer, F.L.1
-
7
-
-
27844543023
-
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
U.S. Secret Service and Carnegie Mellon Univ, Software Eng. Inst
-
M. Keeney et al., Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, tech. report, U.S. Secret Service and Carnegie Mellon Univ., Software Eng. Inst., 2005; www.secretservice.gov/ntac/ its_report_050516.pdf.
-
(2005)
tech. report
-
-
Keeney, M.1
-
8
-
-
38949200175
-
-
M.R. Randazzo et al., Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, tech. report no. CME/SEI-2004-TR-021, Carnegie Mellon Univ., Software Eng. Inst., 2004; www.sei.cmu.edu/publications/ documents/04.reports/04tr021.html.
-
M.R. Randazzo et al., Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, tech. report no. CME/SEI-2004-TR-021, Carnegie Mellon Univ., Software Eng. Inst., 2004; www.sei.cmu.edu/publications/ documents/04.reports/04tr021.html.
-
-
-
-
9
-
-
38949092810
-
Proc. 25th Conf. System Dynamics Soc
-
The System Dynamics Society
-
A.P. Moore et al., "An Experience Using System Dynamics Modeling to Facilitate an Insider Threat Workshop," Proc. 25th Conf. System Dynamics Soc., The System Dynamics Society, 2007; www.cert.org/archive/pdf/ISDC2007. pdf.
-
(2007)
-
-
Moore, A.P.1
-
10
-
-
38949109248
-
-
S.R. Band et al., Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, tech. report CMU/SEI-2006-TR-026, Carnegie-Mellon Univ., Software Eng. Inst., 2006.
-
S.R. Band et al., Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis, tech. report CMU/SEI-2006-TR-026, Carnegie-Mellon Univ., Software Eng. Inst., 2006.
-
-
-
-
11
-
-
51249123658
-
-
tech. report, Carnegie Mellon Univ, CyLab and the Internet Security Alliance, July
-
D.M. Cappelli, A.P. Moore, and T.J. Shimeall, Common Sense Guide to Prevention/Detection of Insider Threats, tech. report, Carnegie Mellon Univ., CyLab and the Internet Security Alliance, July 2006; www.cert.org/ archive/pdf/CommonSenseInsiderThreatsV2.1-1-070118.pdf.
-
(2006)
Common Sense Guide to Prevention/Detection of Insider Threats
-
-
Cappelli, D.M.1
Moore, A.P.2
Shimeall, T.J.3
-
12
-
-
84886931577
-
Management and Education of the Risk of Insider Threat (MERIT): System Dynamics Modeling of Computer System Sabotage
-
The System Dynamics Society
-
D. Cappelli et al., "Management and Education of the Risk of Insider Threat (MERIT): System Dynamics Modeling of Computer System Sabotage," Proc. 24th Conf. System Dynamics Soc., The System Dynamics Society, 2006; www.cert.org/archive/pdf/merit.pdf.
-
(2006)
Proc. 24th Conf. System Dynamics Soc
-
-
Cappelli, D.1
|