-
2
-
-
84899850650
-
Common sense guide to prevention and detection of insider threat (3rd ed
-
Cappelli, D.M.; Moore, A.P.; Trzeciak, R.F.; and Shimeall, T.J. Common Sense Guide to Prevention and Detection of Insider Threat (3rd ed.). CERT Program, Software Engineering Institute, and CyLab of Carnegie Mellon, 2008.
-
(2008)
CERT Program, Software Engineering Institute, and CyLab of Carnegie Mellon
-
-
Cappelli, D.M.1
Moore, A.P.2
Trzeciak, R.F.3
Shimeall, T.J.4
-
3
-
-
33646204176
-
-
Software Engineering Institute, Carnegie Mellon University
-
Ellison, R.J.; Moore, A.P.; Bass, L.; Klein, M.; and Bachmann, F. Security and Survivability Reasoning Frameworks and Architectural Design Tactics (CMU/SEI-2004-TN-022). Software Engineering Institute, Carnegie Mellon University, 2004.
-
(2004)
Security and Survivability Reasoning Frameworks and Architectural Design Tactics (CMU/SEI-2004-TN-022
-
-
Ellison, R.J.1
Moore, A.P.2
Bass, L.3
Klein, M.4
Bachmann, F.5
-
4
-
-
84899842694
-
Candidate technical controls and indicators of insider attack from socio-technical models and data
-
November
-
Hanley, M. "Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data." Proceedings of the 2010 NSA CAE Workshop on Insider Threat, November 2010.
-
(2010)
Proceedings of the 2010 NSA CAE Workshop on Insider Threat
-
-
Hanley, S.1
-
5
-
-
80052850317
-
-
Software Engineering Institute, Carnegie Mellon University
-
Hanley, M.; Dean, T.; Schroeder, W.; Houy, M.; Trzeciak, R.F.; and Montelibano, J. An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases (CMU/SEI-2011-TN-006). Software Engineering Institute, Carnegie Mellon University, 2011.
-
(2011)
An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases (CMU/SEI-2011-TN-006
-
-
Hanley, M.1
Dean, T.2
Schroeder, W.3
Houy, M.4
Trzeciak, R.F.5
Montelibano, J.6
-
6
-
-
84855181760
-
A preliminary model of insider theft of intellectual property
-
Moore, A.P.; Cappelli, D.M.; Caron, T.C.; Shaw, E.; Spooner, D.; and Trzeciak, R.F. "A Preliminary Model of Insider Theft of Intellectual Property." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2, 1 (Special Issue Addressing Insider Threats and Information Leakage, 2011): 28-49.
-
(2011)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 2, 1 (Special Issue Addressing Insider Threats and Information Leakage
, pp. 28-49
-
-
Moore, A.P.1
Cappelli, D.M.2
Caron, T.C.3
Shaw, E.4
Spooner, D.5
Trzeciak, R.F.6
-
7
-
-
84899813940
-
A Pattern for trust trap mitigation
-
NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," Revision 3, August
-
Mundie, D.A. and Moore, A.P., "A Pattern for Trust Trap Mitigation," Proceedings of the 2011 Conference on Pattern Languages for Programs, forthcoming. NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," Revision 3, August 2009. http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/ sp800-53-rev3-final.pdf
-
(2009)
Proceedings of the 2011 Conference on Pattern Languages for Programs, Forthcoming
-
-
Mundie, A.D.1
Moore, A.P.2
-
8
-
-
33750050331
-
-
John Wiley &Sons, Ltd
-
Schumacher, M.; Fernandez-Buglioni, E.; Hybertson, D.; Buschmann, F.; and Sommerlad, P. Security Patterns: Integrating Security and Systems Engineering. John Wiley &Sons, Ltd, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
|