-
1
-
-
43149116934
-
Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem
-
Anderson, D.F; Cappelli, D.M.; Gonzalez, J.J; Mojtahedzadeh, M.; Moore, A.P.; Rich, E.; Sarriegui, J.M.; Shimeall, T.J.; Stanton, J.M.; Weaver, E. & Zagonel. A. (2004). "Preliminary System Dynamics Maps of the Insider Cyber-Threat Problem". Proceedings of the 22nd International Conference of the System Dynamics Society.
-
(2004)
Proceedings of the 22nd International Conference of the System Dynamics Society
-
-
Anderson, D.F.1
Cappelli, D.M.2
Gonzalez, J.J.3
Mojtahedzadeh, M.4
Moore, A.P.5
Rich, E.6
Sarriegui, J.M.7
Shimeall, T.J.8
Stanton, J.M.9
Weaver, E.10
Zagonel, A.11
-
2
-
-
0004114009
-
-
Center for the Study of Intelligence, Central Intelligence Agency
-
Heuer, R.J. (2001). "Psychology of Intelligence Analysis". Center for the Study of Intelligence, Central Intelligence Agency.
-
(2001)
Psychology of Intelligence Analysis
-
-
Heuer, R.J.1
-
3
-
-
33846974969
-
Comparison of Conceptual Graphs
-
Montes-y-Gómez, M., Gelbukh, A., and Lópes-López, A. (2000). "Comparison of Conceptual Graphs". In Proceeding of MICAI-2000", In 1st Mexican International Conference on Artificial Intelligence.
-
(2000)
In Proceeding of MICAI-2000, In 1st Mexican International Conference on Artificial Intelligence
-
-
Montes-y-Gómez, M.1
Gelbukh, A.2
Lópes-López, A.3
-
5
-
-
35048848603
-
Towards a Social Network Approach for Monitoring Insider Threats to Information Security
-
Natarajan, Anand & Hossain, Liaquat (2004). "Towards a Social Network Approach for Monitoring Insider Threats to Information Security". Lecture Notes in Computer Science, Volume 3073. Pages 501-507.
-
(2004)
Lecture Notes in Computer Science
, vol.3073
, pp. 501-507
-
-
Natarajan, A.1
Hossain, L.2
-
6
-
-
33847609906
-
Capturing User Intent for Information Retrieval
-
new Orleans, LA
-
Nguyen, H.; Santos, E Jr.; Zhao, Q.; and Wang, H. (2004b). "Capturing User Intent for Information Retrieval". Proceedings of the 48th Annual Meeting for the Human Factors and Ergonomics Society (HFES-04), new Orleans, LA. Pages 371-375.
-
(2004)
Proceedings of the 48th Annual Meeting for the Human Factors and Ergonomics Society (HFES-04)
, pp. 371-375
-
-
Nguyen, H.1
Santos Jr., E.2
Zhao, Q.3
Wang, H.4
-
7
-
-
33745931451
-
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
-
Park, Joon S. & Ho, Shuyuan Mary (2004). "Composite Role-Based Monitoring (CRBM) for Countering Insider Threats". Lecture Notes in Computer Science, Volume 3073. Pages 201-213.
-
(2004)
Lecture Notes in Computer Science
, vol.3073
, pp. 201-213
-
-
Park, J.S.1
Ho, S.M.2
-
9
-
-
62949198438
-
A Cognitive Framework for Information Gathering with Deception Detection for Intelligence Analysis
-
Santos, E Jr, Zhao, Q, Johnson, G, Nguyen, H & Thompson, P. (2005b). "A Cognitive Framework for Information Gathering with Deception Detection for Intelligence Analysis". Proceedings of 2005 International Conference on Intelligence Analysis.
-
(2005)
Proceedings of 2005 International Conference on Intelligence Analysis
-
-
Santos Jr, E.1
Zhao, Q.2
Johnson, G.3
Nguyen, H.4
Thompson, P.5
-
11
-
-
35048892579
-
-
Symonenko, Svetlana; Liddy, Elizabeth D. Liddy; Yilmazel, Ozgur; Zoppo, Robert Del; Brown, Eric & Downey, Matt (2004). Semantic Analysis for Monitoring Insider Threats. Lecture Notes in Computer Science, 3073. Pages 492-500.
-
Symonenko, Svetlana; Liddy, Elizabeth D. Liddy; Yilmazel, Ozgur; Zoppo, Robert Del; Brown, Eric & Downey, Matt (2004). "Semantic Analysis for Monitoring Insider Threats". Lecture Notes in Computer Science, Volume 3073. Pages 492-500.
-
-
-
-
12
-
-
10044278199
-
Weak Models for Insider Threat Detection
-
Thompson, Paul (2004). "Weak Models for Insider Threat Detection". Proceedings of SPIE.
-
(2004)
Proceedings of SPIE
-
-
Thompson, P.1
-
13
-
-
62949133383
-
What Is Needed for a Good Summary. Two Different Types of Document Sets Yet Seemingly Indistinguishable to Human Users
-
IEEE Press. Maui, HI
-
Zhao Q.; Santos Jr. E.; Nguyen H.; and Mohammed A. (2006). "What Is Needed for a Good Summary. Two Different Types of Document Sets Yet Seemingly Indistinguishable to Human Users". In Proceedings of HICSS-39, IEEE Press. Maui, HI.
-
(2006)
Proceedings of HICSS-39
-
-
Zhao, Q.1
Santos Jr., E.2
Nguyen, H.3
Mohammed, A.4
|