-
1
-
-
43149116934
-
Preliminary system dynamics maps of the insider cyber- threat problem
-
July
-
Anderson, D. F., Cappelli, D. M., Gonzalez, J. J., Mojahedzadeh, M., Moore, A. P., Rich, E., et al. (July 2004). Preliminary System Dynamics Maps of the Insider Cyber- Threat Problem. Proceedings of the 22nd International Conference of the System Dynamics Society.
-
(2004)
Proceedings of the 22nd International Conference of the System Dynamics Society
-
-
Anderson, D.F.1
Cappelli, D.M.2
Gonzalez, J.J.3
Mojahedzadeh, M.4
Moore, A.P.5
Rich, E.6
-
2
-
-
70149090395
-
-
(December ,)Carnegie Mellon University, Software Engineering Institute.
-
Band, S. R., Cappelli, D. M., Fischer, L. F., Moore, A. P., Shaw, E. D., & Trzeciak, R. F. (December 2006). Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis. Carnegie Mellon University, Software Engineering Institute.
-
(2006)
Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis
-
-
Band, S.R.1
Cappelli, D.M.2
Fischer, L.F.3
Moore, A.P.4
Shaw, E.D.5
Trzeciak, R.F.6
-
3
-
-
84887224107
-
Common Sense Guide to Prevention and Detection of Insider Threat
-
September)(3rd ed.).Software Engineering Institute, and CyLab of Carnegie Mesn
-
Cappelli, D. M., Moore, A. P., Trzeciak, R. F., & Shimeall, T. J. (September 2008). Common Sense Guide to Prevention and Detection of Insider Threat (3rd ed.). CERT Program, Software Engineering Institute, and CyLab of Carnegie Mellon.
-
(2008)
CERT Program
-
-
Cappelli, D.M.1
Moore, A.P.2
Trzeciak, R.F.3
Shimeall, T.J.4
-
5
-
-
3042863345
-
The missing link in information security: Three dimensional profiling
-
Gudaitis, T. (1998). The missing link in information security: Three Dimensional Profiling" (Vol. 1). Cyber Psychology and Behavior.
-
(1998)
Cyber Psychology and Behavior
, vol.1
-
-
Gudaitis, T.1
-
7
-
-
0003494816
-
-
Cambridge, MA: Wright Allen Press, Inc
-
Meadows, D. L., Behrens, W. W., Meadows, D. H., Naill, R. F., Randers, J., & Zahn, E. K. (1974). Dynamics of Growth in a Finite World. Cambridge, MA: Wright Allen Press, Inc.
-
(1974)
Dynamics of Growth in a Finite World
-
-
Meadows, D.L.1
Behrens, W.W.2
Meadows, D.H.3
Naill, R.F.4
Randers, J.5
Zahn, E.K.6
-
8
-
-
62949166367
-
-
Vol. Insider Attack and Cyber Secruity: Beyond the Hacker). (S. Stolfo, S. M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, & S. W. Smith, Eds.) New York, NY: Springer Science+Business Media, LLC
-
Moore, A. P., Cappelli, D. M., & Trzeciak, R. F. (2008). The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures (Vol. Insider Attack and Cyber Secruity: Beyond the Hacker). (S. Stolfo, S. M. Bellovin, S. Hershkop, A. Keromytis, S. Sinclair, & S. W. Smith, Eds.) New York, NY: Springer Science+Business Media, LLC.
-
(2008)
The "Big Picture" of Insider IT Sabotage across U.S. Critical Infrastructures
-
-
Moore, A.P.1
Cappelli, D.M.2
Trzeciak, R.F.3
-
18
-
-
84887250947
-
-
(3rd, Ed.) Thousand Oaks: Sage Publications
-
RAND. Yin, R. K. (2003). Case Study Research. (3rd, Ed.) Thousand Oaks: Sage Publications.
-
(2003)
Case Study Research
-
-
Yin, R.A.N.D.1
|