![Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security](https://www.pdfsearch.io/img/6d9e4e08815ba7f7e8f73825ed875363.jpg) Date: 2014-04-30 03:10:27Hacking Software testing Threat Abuse Vulnerability Attack tree Insider Motivation Computer network security Cyberwarfare Computer security | | 2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , GordonAdd to Reading ListSource URL: ieee-security.orgDownload Document from Source Website File Size: 1,27 MBShare Document on Facebook
|