Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Greitzer, Frank L"'
Publikováno v:
In Procedia Computer Science 2019 153:361-369
Publikováno v:
In Computers & Security July 2015 52:142-158
Autor:
Greitzer, Frank L., Kangas, Lars J., Noonan, Christine F., Brown, Christopher R., Ferryman, Thomas
Publikováno v:
e-Service Journal: A Journal of Electronic Services in the Public and Private Sectors, 2013 Oct 01. 9(1), 106-138.
Externí odkaz:
https://www.jstor.org/stable/10.2979/eservicej.9.1.106
Autor:
Greitzer, Frank L., Hohimer, Ryan E.
Publikováno v:
Journal of Strategic Security, 2011 Jul 01. 4(2), 25-48.
Externí odkaz:
https://www.jstor.org/stable/26463925
Publikováno v:
IEEE Engineering Management Review; Jun2019, Vol. 47 Issue 2, p75-83, 9p
Autor:
Bishop, Matt, Engle, Sophie, Frincke, Deborah A, Gates, Carrie, Greitzer, Frank L, Peisert, Sean, Whalen, Sean
Publikováno v:
Bishop, Matt; Engle, Sophie; Frincke, Deborah A; Gates, Carrie; Greitzer, Frank L; Peisert, Sean; et al.(2010). A Risk Management Approach to the 'Insider Threat'. ADVANCES IN INFORMATION SECURITY, 49(7), 115-137. doi: 10.1007/978-1-4419-7133-3. UC Davis: Retrieved from: http://www.escholarship.org/uc/item/9pb9d2jc
ADVANCES IN INFORMATION SECURITY, vol 49
ADVANCES IN INFORMATION SECURITY, vol 49
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, many define it only implicitly. In theory, appropriate selecti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1f18cb19996336b1c4556a029df251de
http://www.escholarship.org/uc/item/9pb9d2jc
http://www.escholarship.org/uc/item/9pb9d2jc
Autor:
Greitzer, Frank L., Strozer, Jeremy R., Cohen, Sholom, Moore, Andrew P., Mundie, David, Cowley, Jennifer
Publikováno v:
2014 IEEE Security & Privacy Workshops; 2014, p236-250, 15p
Autor:
Greitzer, Frank L., Strozer, Jeremy, Cohen, Sholom, Bergey, John, Cowley, Jennifer, Moore, Andrew, Mundie, David
Publikováno v:
2014 47th Hawaii International Conference on System Sciences; 2014, p2025-2034, 10p
Publikováno v:
2013 IEEE Security & Privacy Workshops; 2013, p90-97, 8p
Publikováno v:
2013 46th Hawaii International Conference on System Sciences; 2013, p1849-1858, 10p