![Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security](https://www.pdfsearch.io/img/d7186ff332e3bd7544253c8c47dd50c0.jpg) Date: 2015-03-18 10:54:32Hacking Software testing Threat Abuse Vulnerability Attack tree Insider Motivation Computer network security Cyberwarfare Computer security | | 2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , GordonAdd to Reading ListSource URL: www.cs.ox.ac.ukDownload Document from Source Website File Size: 1,27 MBShare Document on Facebook
|