Back to Results
First PageMeta Content
Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security


2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon
Add to Reading List

Document Date: 2014-04-30 03:10:27


Open Document

File Size: 1,27 MB

Share Result on Facebook
UPDATE