Author of the publication

10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response.

, , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Risk of Risk Analysis-And its relation to the Economics of Insider Threats., and . WEIS, (2009)10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response., , , , and . Insider Threats: Strategies for Prevention, Mitigation, and Response, volume 10341 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2010)Insiders Behaving Badly., , , and . IEEE Secur. Priv., 6 (4): 66-70 (2008)The sisterhood of the traveling packets., , and . NSPW, page 59-70. ACM, (2009)08302 Abstracts Collection - Countering Insider Threats., , , and . Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)08302 Summary - Countering Insider Threats., , , and . Countering Insider Threats, volume 08302 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)A privacy expectations and security assurance offer system.. NSPW, page 15-22. ACM, (2007)Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat.. Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Attribution Of Cyber Attacks On Process Control Systems., , and . Critical Infrastructure Protection, volume 290 of IFIP Advances in Information and Communication Technology, page 87-99. Springer, (2008)Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques., and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2 (1): 4-27 (2011)