-
1
-
-
68949114026
-
-
online auctions, 2004
-
A. Arora, H. Xu, R. Padman, W. Vogt, Optimal bidding in sequential online auctions. www.ftc.gov/be/vogt.pdf, 2004
-
Optimal bidding in sequential
-
-
Arora, A.1
Xu, H.2
Padman, R.3
Vogt, W.4
-
2
-
-
33645849065
-
-
Association of Certified Fraud Examiners, Austin, Texas
-
Association of Certified Fraud Examiners, 2006 ACFE Report to the Nation on Occupational Fraud and Abuse, Austin, Texas. www.acfe.com/documents/2006-RttN.pdf, 2006
-
(2006)
ACFE Report to the Nation on Occupational Fraud and Abuse
-
-
-
3
-
-
84886931577
-
Management and education of the risk of insider threat (MERIT): System dynamics modeling of computer system sabotage
-
D. Cappelli, A. Desai, A. Moore, T. Shimeall, E. Weaver, B. Willke, Management and education of the risk of insider threat (MERIT): System dynamics modeling of computer system sabotage, in: Proceedings of the International Conference of the System Dynamics Society, 2006
-
(2006)
Proceedings of the International Conference of the System Dynamics Society
-
-
Cappelli, D.1
Desai, A.2
Moore, A.3
Shimeall, T.4
Weaver, E.5
Willke, B.6
-
6
-
-
3242808612
-
-
Computer Security Institute, San Francisco, California
-
L. Gordon, M. Loeb, W. Lucyshyn, R. Richardson, 2006 CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, California, 2006
-
(2006)
CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.1
Loeb, M.2
Lucyshyn, W.3
Richardson, R.4
-
8
-
-
27844543023
-
-
Pittsburgh, Pennsylvania
-
M. Keeney, E. Kowalski, D. Cappelli, A. Moore, T. Shimeall, S. Rogers, Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania. www.cert.org/archive/pdf/insidercross051105.pdf, 2005
-
(2005)
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors
-
-
Keeney, M.1
Kowalski, E.2
Cappelli, D.3
Moore, A.4
Shimeall, T.5
Rogers, S.6
-
9
-
-
0000619048
-
Extensive games and the problem of information
-
Kuhn H., and Tucker A. (Eds), Princeton University Press, Princeton, New Jersey
-
Kuhn H. Extensive games and the problem of information. In: Kuhn H., and Tucker A. (Eds). Contributions to the Theory of Games (1953), Princeton University Press, Princeton, New Jersey 193-216
-
(1953)
Contributions to the Theory of Games
, pp. 193-216
-
-
Kuhn, H.1
-
10
-
-
49049121156
-
Simulating insider cyber-threat risks: A model-based case and a case-based model
-
E. Rich, I. Martinez-Moyano, S. Conrad, D. Cappelli, A. Moore, T. Shimeall, D. Andersen, J. Gonzalez, R. Ellison, H. Lipson, D. Mundie, J. Sarriegi, A. Sawicka, T. Stewart, J. Torres, J. Wiik, E. Weaver, Simulating insider cyber-threat risks: A model-based case and a case-based model, in: Proceedings of the International Conference of the Systems Dynamics Society, 2005
-
(2005)
Proceedings of the International Conference of the Systems Dynamics Society
-
-
Rich, E.1
Martinez-Moyano, I.2
Conrad, S.3
Cappelli, D.4
Moore, A.5
Shimeall, T.6
Andersen, D.7
Gonzalez, J.8
Ellison, R.9
Lipson, H.10
Mundie, D.11
Sarriegi, J.12
Sawicka, A.13
Stewart, T.14
Torres, J.15
Wiik, J.16
Weaver, E.17
-
11
-
-
68949136629
-
-
Public Policy Center, University of Nebraska, Lincoln, Nebraska
-
M. Scalora, D. Bulling, Developing Threat Assessment Best Practice Standards: Leveraging Behavioral Science Strategies to Enhance Decision-Making, Public Policy Center, University of Nebraska, Lincoln, Nebraska, 2007
-
(2007)
Developing Threat Assessment Best Practice Standards: Leveraging Behavioral Science Strategies to Enhance Decision-Making
-
-
Scalora, M.1
Bulling, D.2
-
12
-
-
24644478392
-
An insider threat model for adversary simulation
-
Anderson R., Bozek T., Longstaff T., Meitzler W., Skroch M., and Wyk K. (Eds), RAND Corporation, Pittsburgh, Pennsylvania
-
Wood B. An insider threat model for adversary simulation. In: Anderson R., Bozek T., Longstaff T., Meitzler W., Skroch M., and Wyk K. (Eds). Research on Mitigating the Insider Threat to Information Systems (2000), RAND Corporation, Pittsburgh, Pennsylvania
-
(2000)
Research on Mitigating the Insider Threat to Information Systems
-
-
Wood, B.1
|