-
2
-
-
84885688665
-
Measuring the cost of cybercrime
-
Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M., Levi, M., Moore, T., Savage, S.: Measuring the cost of cybercrime. In: WEIS (2012)
-
(2012)
WEIS
-
-
Anderson, R.1
Barton, C.2
Böhme, R.3
Clayton, R.4
Van Eeten, M.5
Levi, M.6
Moore, T.7
Savage, S.8
-
3
-
-
70149090395
-
-
Technical Report CMU/SEI-2006-TR-026, Carnegie Mellon University
-
Band, S., Cappelli, D., Fischer, L., Moore, A., Shaw, E., Trzeciak, R.: Comparing insider IT sabotage and espionage: A model-based analysis. Technical Report CMU/SEI-2006-TR-026, Carnegie Mellon University (2006)
-
(2006)
Comparing Insider IT Sabotage and Espionage: A Model-based Analysis
-
-
Band, S.1
Cappelli, D.2
Fischer, L.3
Moore, A.4
Shaw, E.5
Trzeciak, R.6
-
4
-
-
0035582316
-
Assessing knowledge assets: A review of the models used to measure intellectual capital
-
Bontis, N.: Assessing knowledge assets: A review of the models used to measure intellectual capital. International Journal of Management Reviews 3(1), 41-60 (2001)
-
(2001)
International Journal of Management Reviews
, vol.3
, Issue.1
, pp. 41-60
-
-
Bontis, N.1
-
5
-
-
77956652072
-
Human factors in information security: The insider threat - Who can you trust these days?
-
Colwill, C.: Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report 14(4), 186-196 (2009)
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
7
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1), 79-98 (2009)
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
8
-
-
84885679339
-
-
FBI. The insider threat (April 2013), http://www.fbi.gov/about-us/ investigate/counterintelligence/insider-threat-brochure
-
(2013)
The Insider Threat April
-
-
-
9
-
-
84885683402
-
-
Federal Bureau of Investigation. Economic espionage, http://www.fbi.gov/ about-us/investigate/counterintelligence/economic-espionage
-
Economic Espionage
-
-
-
11
-
-
84869417796
-
Where to hide the bits?
-
Grossklags, J., Walrand, J. (eds.) GameSec 2012 Springer, Heidelberg
-
Johnson, B., Schöttle, P., Böhme, R.: Where to hide the bits? In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 1-17. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7638
, pp. 1-17
-
-
Johnson, B.1
Schöttle, P.2
Böhme, R.3
-
12
-
-
68949143256
-
Game theoretic modeling and analysis of insider threats
-
Liu, D., Wang, X.F., Jean Camp, L.: Game theoretic modeling and analysis of insider threats. International Journal of Critical Infrastructure Protection 1, 75-80 (2008)
-
(2008)
International Journal of Critical Infrastructure Protection
, vol.1
, pp. 75-80
-
-
Liu, D.1
Wang, X.F.2
Jean Camp, L.3
-
13
-
-
84855181760
-
A preliminary model of insider theft of intellectual property
-
Moore, A., Cappelli, D., Caron, T., Shaw, E., Spooner, D., Trzeciak, R.: A preliminary model of insider theft of intellectual property. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2(1), 28-49 (2011)
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.2
, Issue.1
, pp. 28-49
-
-
Moore, A.1
Cappelli, D.2
Caron, T.3
Shaw, E.4
Spooner, D.5
Trzeciak, R.6
-
14
-
-
84857929348
-
Insider threat behavior factors: A comparison of theory with reported incidents
-
Munshi, A., Dell, P., Armstrong, H.: Insider threat behavior factors: A comparison of theory with reported incidents. In: IEEE HICSS 2012, pp. 2402-2411 (2012)
-
(2012)
IEEE HICSS 2012
, pp. 2402-2411
-
-
Munshi, A.1
Dell, P.2
Armstrong, H.3
-
15
-
-
0000238336
-
A simplex method for function minimization
-
Nelder, J., Mead, R.: A simplex method for function minimization. Computer Journal 7, 308-313 (1965)
-
(1965)
Computer Journal
, vol.7
, pp. 308-313
-
-
Nelder, J.1
Mead, R.2
-
16
-
-
32644465248
-
-
Technical Report CMU/SEI-2004-TR-021, Carnegie Mellon University June
-
Randazzo, M., Keeney, M., Kowalski, E., Cappelli, D., Moore, A.: Insider threat study: Illicit cyber activity in the banking and finance sector. Technical Report CMU/SEI-2004-TR-021, Carnegie Mellon University (June 2005)
-
(2005)
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
-
-
Randazzo, M.1
Keeney, M.2
Kowalski, E.3
Cappelli, D.4
Moore, A.5
-
18
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., Schroeder, M.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
|