Seguir
Andrew Moore
Andrew Moore
Software Engineering Institute
Dirección de correo verificada de cert.org
Título
Citado por
Citado por
Año
Attack modeling for information security and survivability
AP Moore, RJ Ellison, RC Linger
Carnegie-Mellon Univ Pittsburgh Pa Software Engineering Inst, 2001
5312001
The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)
DM Cappelli, AP Moore, RF Trzeciak
Addison-Wesley, 2012
4042012
The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)
DM Cappelli, AP Moore, RF Trzeciak
Addison-Wesley, 2012
4042012
Insider threat study: Computer system sabotage in critical infrastructure sectors
M Keeney, E Kowalski, D Cappelli, A Moore, T Shimeall, S Rogers
National Threat Assessment Ctr Washington Dc, 2005
2822005
Insider threat study: Illicit cyber activity in the banking and finance sector
MR Randazzo, M Keeney, E Kowalski, D Cappelli, A Moore
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2005
2602005
Common sense guide to prevention and detection of insider threats
D Cappelli, A Moore, R Trzeciak, TJ Shimeall
version, 2009
192*2009
Combating the insider cyber threat
FL Greitzer, AP Moore, DM Cappelli, DH Andrews, LA Carroll, TD Hull
IEEE Security & Privacy 6 (1), 61-64, 2008
1502008
Combating the insider cyber threat
FL Greitzer, AP Moore, DM Cappelli, DH Andrews, LA Carroll, TD Hull
IEEE Security & Privacy 6 (1), 61-64, 2008
1502008
The “big picture” of insider IT sabotage across US critical infrastructures
AP Moore, DM Cappelli, RF Trzeciak
Insider Attack and Cyber Security: Beyond the Hacker, 17-52, 2008
1422008
Common sense guide to mitigating insider threats
GJ Silowash, DM Cappelli, AP Moore, RF Trzeciak, T Shimeall, L Flynn
Carnegie Mellon University, 2012
1382012
Comparing insider IT sabotage and espionage: A model-based analysis
SR Band, DM Cappelli, LF Fischer, AP Moore, ED Shaw, RF Trzeciak
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2006
1352006
Analysis of unintentional insider threats deriving from social engineering exploits
FL Greitzer, JR Strozer, S Cohen, AP Moore, D Mundie, J Cowley
2014 IEEE Security and Privacy Workshops, 236-250, 2014
1082014
Insider threat study: Illicit cyber activity involving fraud in the US financial services sector
A Cummings, T Lewellen, D McIntire, AP Moore, R Trzeciak
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2012
912012
Preliminary system dynamics maps of the insider cyber-threat problem
DF Andersen, D Cappelli, JJ Gonzalez, M Mojtahedzadeh, A Moore, ...
Proceedings of the 22nd International Conference of the System dynamics …, 2004
902004
A preliminary model of insider theft of intellectual property
AP Moore, D Cappelli, TC Caron, ED Shaw, D Spooner, RF Trzeciak
Carnegie Mellon University, 2011
802011
Unintentional insider threat: contributing factors, observables, and mitigation strategies
FL Greitzer, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, D Mundie
2014 47th Hawaii International Conference on System Sciences, 2025-2034, 2014
762014
Common sense guide to mitigating insider threats
M Collins, M Theis, R Trzeciak, J Strozer, J Clark, D Costa, T Cassidy, ...
Carnegie Mellon University, 2016
662016
Insider threat study: Illicit cyber activity in the information technology and telecommunications sector
E Kowalski, D Cappelli, A Moore
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2008
662008
Insider threat study: Illicit cyber activity in the government sector
E Kowalski, T Conway, S Keverline, M Williams, D Cappelli, B Willke, ...
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, 2008
662008
Design and assurance strategy for the NRL pump
MH Kang, AP Moore, IS Moskowitz
Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997
661997
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20