31![2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon 2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon](https://www.pdfsearch.io/img/6d9e4e08815ba7f7e8f73825ed875363.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2014-04-30 03:10:27
|
---|
32![Realtime Ad Hoc Search in Twitter: Know-Center at TREC Microblog Track 2011 Christopher Horn, Oliver Pimas, Michael Granitzer, and Elisabeth Lex Know-Center Graz, Inffeldgasse 21a, 8010 Graz, Austria {chorn,opimas,mgran Realtime Ad Hoc Search in Twitter: Know-Center at TREC Microblog Track 2011 Christopher Horn, Oliver Pimas, Michael Granitzer, and Elisabeth Lex Know-Center Graz, Inffeldgasse 21a, 8010 Graz, Austria {chorn,opimas,mgran](https://www.pdfsearch.io/img/dc1881f2afee20d0e4b65d55b7c05225.jpg) | Add to Reading ListSource URL: trec.nist.govLanguage: English - Date: 2012-02-03 09:41:35
|
---|
33![Scanned and edited by Michael Holley Oliver Audio Engineering Document Mar 1, 2001 Circa 1976 Scanned and edited by Michael Holley Oliver Audio Engineering Document Mar 1, 2001 Circa 1976](https://www.pdfsearch.io/img/9f4a5db879a7b79062eee72a7ac90599.jpg) | Add to Reading ListSource URL: www.swtpc.comLanguage: English - Date: 2005-04-27 01:50:53
|
---|
34![Bicycle Technical Committee – June, 2006 Meeting Minutes Overland Park, Kansas Wednesday, June 28th Present: Richard Moeur, John LaPlante, James Mackay, Michael Jackson, Tim Oliver, and Bill Fox Guests: Cindy E Bicycle Technical Committee – June, 2006 Meeting Minutes Overland Park, Kansas Wednesday, June 28th Present: Richard Moeur, John LaPlante, James Mackay, Michael Jackson, Tim Oliver, and Bill Fox Guests: Cindy E](https://www.pdfsearch.io/img/fbfac99d7899770c087b7f448bfb27d9.jpg) | Add to Reading ListSource URL: www.ncutcdbtc.orgLanguage: English - Date: 2011-11-16 17:24:49
|
---|
35![NCUTCD BTC Meeting Minutes January 18, 2006 Present: Richard Moeur, Tom Dodds, Tim Oliver, Bob Carrigan, Michael Jackson, Theo Petritsch, Jon Wertjes, Dwight Kingsbury, Dorin Fera, John Ciccarelli, John Allen, Bill Fox, NCUTCD BTC Meeting Minutes January 18, 2006 Present: Richard Moeur, Tom Dodds, Tim Oliver, Bob Carrigan, Michael Jackson, Theo Petritsch, Jon Wertjes, Dwight Kingsbury, Dorin Fera, John Ciccarelli, John Allen, Bill Fox,](https://www.pdfsearch.io/img/61d29ac3ffde6c1984242e01c34a27ff.jpg) | Add to Reading ListSource URL: www.ncutcdbtc.orgLanguage: English - Date: 2011-11-16 17:24:42
|
---|
36![FRCGC/JAMSTEC Ozone Production in Global Tropospheric Models: Quantifying Errors due to Grid Resolution Oliver Wild1,2 and Michael Prather3 3 Earth System Science, University of California, Irvine, California FRCGC/JAMSTEC Ozone Production in Global Tropospheric Models: Quantifying Errors due to Grid Resolution Oliver Wild1,2 and Michael Prather3 3 Earth System Science, University of California, Irvine, California](https://www.pdfsearch.io/img/7d5370141b61b65159efae64aba4e225.jpg) | Add to Reading ListSource URL: www.lancaster.ac.ukLanguage: English - Date: 2010-09-27 05:12:50
|
---|
37![2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon 2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon](https://www.pdfsearch.io/img/d7186ff332e3bd7544253c8c47dd50c0.jpg) | Add to Reading ListSource URL: www.cs.ox.ac.ukLanguage: English - Date: 2015-03-18 10:54:32
|
---|
38![Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute Reflecting on the Ability of Enterprise Security Policy to Address Accidental Insider Threat Oliver Buckley, Jason R. C. Nurse, Philip A. Legg, Michael Goldsmith, Sadie Creese Cyber Security Centre, Department of Compute](https://www.pdfsearch.io/img/f61843bada51e1c5d7fdfb9450b2294a.jpg) | Add to Reading ListSource URL: www.cs.ox.ac.ukLanguage: English - Date: 2015-03-18 10:54:09
|
---|
39![Journal ofhttp://jcr.sagepub.com/ Conflict Resolution Land Reform as a Counterinsurgency Policy: Evidence from Colombia Michael Albertus and Oliver Kaplan Journal of Conflict Resolution published online 28 June 2012 Journal ofhttp://jcr.sagepub.com/ Conflict Resolution Land Reform as a Counterinsurgency Policy: Evidence from Colombia Michael Albertus and Oliver Kaplan Journal of Conflict Resolution published online 28 June 2012](https://www.pdfsearch.io/img/5cb1c5801c01f69988d37e51b98c386c.jpg) | Add to Reading ListSource URL: political-science.uchicago.eduLanguage: English - Date: 2012-07-19 10:20:38
|
---|
40![Journal ofhttp://jcr.sagepub.com/ Conflict Resolution Land Reform as a Counterinsurgency Policy : Evidence from Colombia Michael Albertus and Oliver Kaplan Journal of Conflict Resolution: 198 originally published Journal ofhttp://jcr.sagepub.com/ Conflict Resolution Land Reform as a Counterinsurgency Policy : Evidence from Colombia Michael Albertus and Oliver Kaplan Journal of Conflict Resolution: 198 originally published](https://www.pdfsearch.io/img/a8c2b1fd9d537ee12a9d45914a1deef3.jpg) | Add to Reading ListSource URL: www.du.eduLanguage: English - Date: 2014-01-09 11:24:33
|
---|