Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Insider threat). Showing records 1 – 25 of 25 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Penn State University

1. Zhang, Tao. Towards Flexible and Realistic Insider Mission Simulation.

Degree: 2018, Penn State University

 ABSTRACT With the widespread application of information technology, organizations rely more and more on networked information system to manage their daily affairs. As a result,… (more)

Subjects/Keywords: Insider threat; Insider mission; Mission dimension; Business process; Insider mission simulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, T. (2018). Towards Flexible and Realistic Insider Mission Simulation. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14888tzz5020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Tao. “Towards Flexible and Realistic Insider Mission Simulation.” 2018. Thesis, Penn State University. Accessed November 30, 2020. https://submit-etda.libraries.psu.edu/catalog/14888tzz5020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Tao. “Towards Flexible and Realistic Insider Mission Simulation.” 2018. Web. 30 Nov 2020.

Vancouver:

Zhang T. Towards Flexible and Realistic Insider Mission Simulation. [Internet] [Thesis]. Penn State University; 2018. [cited 2020 Nov 30]. Available from: https://submit-etda.libraries.psu.edu/catalog/14888tzz5020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang T. Towards Flexible and Realistic Insider Mission Simulation. [Thesis]. Penn State University; 2018. Available from: https://submit-etda.libraries.psu.edu/catalog/14888tzz5020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


RMIT University

2. Gamachchi, A. Mathematical models for insider threat mitigation.

Degree: 2017, RMIT University

 The world is rapidly undergoing a massive digital transformation where every human will have no choice but to rely on the confidentiality, integrity, and availability… (more)

Subjects/Keywords: Fields of Research; Insider Threat; Insider Threat Detection; Anaomaly Detection; User Behaviour Analysis; Graph Theory; Attributed Graphs; Data Mining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gamachchi, A. (2017). Mathematical models for insider threat mitigation. (Thesis). RMIT University. Retrieved from http://researchbank.rmit.edu.au/view/rmit:162338

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Thesis, RMIT University. Accessed November 30, 2020. http://researchbank.rmit.edu.au/view/rmit:162338.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gamachchi, A. “Mathematical models for insider threat mitigation.” 2017. Web. 30 Nov 2020.

Vancouver:

Gamachchi A. Mathematical models for insider threat mitigation. [Internet] [Thesis]. RMIT University; 2017. [cited 2020 Nov 30]. Available from: http://researchbank.rmit.edu.au/view/rmit:162338.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gamachchi A. Mathematical models for insider threat mitigation. [Thesis]. RMIT University; 2017. Available from: http://researchbank.rmit.edu.au/view/rmit:162338

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Tampere University

3. Sandberg, Jarkko. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats .

Degree: 2015, Tampere University

 The primary purpose of this study is to determine how suitable human risk management con- trols are against corporate espionage. Information risks are ascending problem… (more)

Subjects/Keywords: corporate espionage; information risk management; insider threat; social engineering; advanced persistent threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sandberg, J. (2015). Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats . (Masters Thesis). Tampere University. Retrieved from https://trepo.tuni.fi/handle/10024/97116

Chicago Manual of Style (16th Edition):

Sandberg, Jarkko. “Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats .” 2015. Masters Thesis, Tampere University. Accessed November 30, 2020. https://trepo.tuni.fi/handle/10024/97116.

MLA Handbook (7th Edition):

Sandberg, Jarkko. “Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats .” 2015. Web. 30 Nov 2020.

Vancouver:

Sandberg J. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats . [Internet] [Masters thesis]. Tampere University; 2015. [cited 2020 Nov 30]. Available from: https://trepo.tuni.fi/handle/10024/97116.

Council of Science Editors:

Sandberg J. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats . [Masters Thesis]. Tampere University; 2015. Available from: https://trepo.tuni.fi/handle/10024/97116

4. Carvallo, Pamela. Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats.

Degree: Docteur es, Informatique, 2018, Université Paris-Saclay (ComUE)

 Le Cloud Computing (CC) ouvre de nouvelles possibilités pour des services plus flexibles et efficaces pour les clients de services en nuage (CSC). Cependant, la… (more)

Subjects/Keywords: Cloud computing; Securité; Detection de menaces; Menace internet; Cloud computing; Security; Threat detection; Insider threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carvallo, P. (2018). Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats. (Doctoral Dissertation). Université Paris-Saclay (ComUE). Retrieved from http://www.theses.fr/2018SACLL008

Chicago Manual of Style (16th Edition):

Carvallo, Pamela. “Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats.” 2018. Doctoral Dissertation, Université Paris-Saclay (ComUE). Accessed November 30, 2020. http://www.theses.fr/2018SACLL008.

MLA Handbook (7th Edition):

Carvallo, Pamela. “Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats.” 2018. Web. 30 Nov 2020.

Vancouver:

Carvallo P. Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats. [Internet] [Doctoral dissertation]. Université Paris-Saclay (ComUE); 2018. [cited 2020 Nov 30]. Available from: http://www.theses.fr/2018SACLL008.

Council of Science Editors:

Carvallo P. Sécurité dans le cloud : framework de détection de menaces internes basé sur l'analyse d'anomalies : Security in the Cloud : an anomaly-based detection framework for the insider threats. [Doctoral Dissertation]. Université Paris-Saclay (ComUE); 2018. Available from: http://www.theses.fr/2018SACLL008


University of Nairobi

5. Abuli, Michael Juma. A Framework for Assessing the Insider Threat in Parastatals in Kenya .

Degree: 2016, University of Nairobi

 Kenyan parastatals have been slow to address the insider threat problem. Nationally, recent industry surveys provide evidence that the Kenyan Banking sector followed by Kenyan… (more)

Subjects/Keywords: Assessing the Insider Threat in Parastatals in Kenya.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abuli, M. J. (2016). A Framework for Assessing the Insider Threat in Parastatals in Kenya . (Thesis). University of Nairobi. Retrieved from http://hdl.handle.net/11295/98253

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abuli, Michael Juma. “A Framework for Assessing the Insider Threat in Parastatals in Kenya .” 2016. Thesis, University of Nairobi. Accessed November 30, 2020. http://hdl.handle.net/11295/98253.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abuli, Michael Juma. “A Framework for Assessing the Insider Threat in Parastatals in Kenya .” 2016. Web. 30 Nov 2020.

Vancouver:

Abuli MJ. A Framework for Assessing the Insider Threat in Parastatals in Kenya . [Internet] [Thesis]. University of Nairobi; 2016. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/11295/98253.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abuli MJ. A Framework for Assessing the Insider Threat in Parastatals in Kenya . [Thesis]. University of Nairobi; 2016. Available from: http://hdl.handle.net/11295/98253

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of South Africa

6. Tekle, Solomon Mekonnen. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).

Degree: 2018, University of South Africa

 The insider threat problem is extremely challenging to address, as it is committed by insiders who are trusted and authorized to access the information resources… (more)

Subjects/Keywords: Insider threat; Fraud diamond; Context-aware system; Information security; Privacy preservation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tekle, S. M. (2018). A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). (Doctoral Dissertation). University of South Africa. Retrieved from http://hdl.handle.net/10500/25968

Chicago Manual of Style (16th Edition):

Tekle, Solomon Mekonnen. “A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).” 2018. Doctoral Dissertation, University of South Africa. Accessed November 30, 2020. http://hdl.handle.net/10500/25968.

MLA Handbook (7th Edition):

Tekle, Solomon Mekonnen. “A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP).” 2018. Web. 30 Nov 2020.

Vancouver:

Tekle SM. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). [Internet] [Doctoral dissertation]. University of South Africa; 2018. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/10500/25968.

Council of Science Editors:

Tekle SM. A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP). [Doctoral Dissertation]. University of South Africa; 2018. Available from: http://hdl.handle.net/10500/25968


University of South Florida

7. Dreibelbis, Rachel Christine. It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors.

Degree: 2016, University of South Florida

 Organizations have become increasingly concerned with developing and protecting their information security systems. Despite attempts to secure the information infrastructure, employees inside of organizations remain… (more)

Subjects/Keywords: cyberpsychology; insider threat; personality; organizational citizenship behaviors; counterproductive work behaviors; Psychology

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dreibelbis, R. C. (2016). It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors. (Thesis). University of South Florida. Retrieved from https://scholarcommons.usf.edu/etd/6083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Dreibelbis, Rachel Christine. “It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors.” 2016. Thesis, University of South Florida. Accessed November 30, 2020. https://scholarcommons.usf.edu/etd/6083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Dreibelbis, Rachel Christine. “It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors.” 2016. Web. 30 Nov 2020.

Vancouver:

Dreibelbis RC. It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors. [Internet] [Thesis]. University of South Florida; 2016. [cited 2020 Nov 30]. Available from: https://scholarcommons.usf.edu/etd/6083.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Dreibelbis RC. It’s More Than Just Changing Your Password: Exploring the Nature and Antecedents of Cyber-Security Behaviors. [Thesis]. University of South Florida; 2016. Available from: https://scholarcommons.usf.edu/etd/6083

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Arkansas

8. Yaseen, Qussai. Mitigating Insider Threat in Relational Database Systems.

Degree: PhD, 2012, University of Arkansas

  The dissertation concentrates on addressing the factors and capabilities that enable insiders to violate systems security. It focuses on modeling the accumulative knowledge that… (more)

Subjects/Keywords: Applied sciences; Information security; Insider threat; Relational database; Security; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yaseen, Q. (2012). Mitigating Insider Threat in Relational Database Systems. (Doctoral Dissertation). University of Arkansas. Retrieved from https://scholarworks.uark.edu/etd/370

Chicago Manual of Style (16th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Doctoral Dissertation, University of Arkansas. Accessed November 30, 2020. https://scholarworks.uark.edu/etd/370.

MLA Handbook (7th Edition):

Yaseen, Qussai. “Mitigating Insider Threat in Relational Database Systems.” 2012. Web. 30 Nov 2020.

Vancouver:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Internet] [Doctoral dissertation]. University of Arkansas; 2012. [cited 2020 Nov 30]. Available from: https://scholarworks.uark.edu/etd/370.

Council of Science Editors:

Yaseen Q. Mitigating Insider Threat in Relational Database Systems. [Doctoral Dissertation]. University of Arkansas; 2012. Available from: https://scholarworks.uark.edu/etd/370


University of New South Wales

9. Shaghaghi, Arash. Securing Software-Defined Network Enabled Enterprises Against Insider Threats.

Degree: Computer Science & Engineering, 2018, University of New South Wales

Insider threats are among the most challenging cyber security issues for enterprises, and even the world's most protected organizations have not been immune to them.In… (more)

Subjects/Keywords: Insider Threat; Software-Defined Network (SDN); SDN Security; Access Control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shaghaghi, A. (2018). Securing Software-Defined Network Enabled Enterprises Against Insider Threats. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/61502

Chicago Manual of Style (16th Edition):

Shaghaghi, Arash. “Securing Software-Defined Network Enabled Enterprises Against Insider Threats.” 2018. Doctoral Dissertation, University of New South Wales. Accessed November 30, 2020. http://handle.unsw.edu.au/1959.4/61502.

MLA Handbook (7th Edition):

Shaghaghi, Arash. “Securing Software-Defined Network Enabled Enterprises Against Insider Threats.” 2018. Web. 30 Nov 2020.

Vancouver:

Shaghaghi A. Securing Software-Defined Network Enabled Enterprises Against Insider Threats. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2020 Nov 30]. Available from: http://handle.unsw.edu.au/1959.4/61502.

Council of Science Editors:

Shaghaghi A. Securing Software-Defined Network Enabled Enterprises Against Insider Threats. [Doctoral Dissertation]. University of New South Wales; 2018. Available from: http://handle.unsw.edu.au/1959.4/61502


University of Illinois – Urbana-Champaign

10. Nellikar, Suraj. Insider threat simulation and performance analysis of insider detection algorithms with role based models.

Degree: MS, 1200, 2010, University of Illinois – Urbana-Champaign

Insider threat problems are widespread in industry today. They have resulted in huge losses to organizations. The security reports by leading organizations point out the… (more)

Subjects/Keywords: Insider threat; Insider detection algorithms; Role-based access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nellikar, S. (2010). Insider threat simulation and performance analysis of insider detection algorithms with role based models. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/16177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Nellikar, Suraj. “Insider threat simulation and performance analysis of insider detection algorithms with role based models.” 2010. Thesis, University of Illinois – Urbana-Champaign. Accessed November 30, 2020. http://hdl.handle.net/2142/16177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Nellikar, Suraj. “Insider threat simulation and performance analysis of insider detection algorithms with role based models.” 2010. Web. 30 Nov 2020.

Vancouver:

Nellikar S. Insider threat simulation and performance analysis of insider detection algorithms with role based models. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2010. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/2142/16177.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Nellikar S. Insider threat simulation and performance analysis of insider detection algorithms with role based models. [Thesis]. University of Illinois – Urbana-Champaign; 2010. Available from: http://hdl.handle.net/2142/16177

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

11. Porter, Michael Lawrence. COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS.

Degree: Master of Security Studies, Intelligence, Security Studies, and Analysis, 2014, Angelo State University

 In recent years, America has seen a rise in insider threat related incidents. Insider threats are individual with placement and access to critical infrastructures, military… (more)

Subjects/Keywords: Insider Threat; Intelligence Community; Counterintelligence; Insider Threat Policy

…States has done a good job of adapting in recent years to the increase of these “insider threat… …overarching question, we must first answer five sub-questions. 1. What is an insider threat? 2… …Community? 4. How will the different Insider Threat Groups increase the IC’s ability to target… …counter this developing threat. By answering the first question (What is an insider threat… …different insider threat groups increased the IC’s ability to target insider threats?) will… 

Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Porter, M. L. (2014). COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS. (Masters Thesis). Angelo State University. Retrieved from http://hdl.handle.net/2346.1/30135

Chicago Manual of Style (16th Edition):

Porter, Michael Lawrence. “COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS.” 2014. Masters Thesis, Angelo State University. Accessed November 30, 2020. http://hdl.handle.net/2346.1/30135.

MLA Handbook (7th Edition):

Porter, Michael Lawrence. “COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS.” 2014. Web. 30 Nov 2020.

Vancouver:

Porter ML. COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS. [Internet] [Masters thesis]. Angelo State University; 2014. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/2346.1/30135.

Council of Science Editors:

Porter ML. COMBATING INSIDER THREATS: AN ANALYSIS OF CURRENT UNITED STATES INSIDER THREAT POLICIES AND NECESSARY IMPROVEMENTS. [Masters Thesis]. Angelo State University; 2014. Available from: http://hdl.handle.net/2346.1/30135


Texas A&M University

12. Setiawan, Yanuar Ady. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.

Degree: MS, Nuclear Engineering, 2018, Texas A&M University

 The Estimate of Adversary Sequence Interruption (EASI) model is a single path analysis model to calculate the Probability of Interruption (PvI) of a Physical Protection… (more)

Subjects/Keywords: Physical Protection System (PPS); Stochastic (Monte Carlo) Approach; Multi-Path Analysis; Adversary Path; Insider Threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Setiawan, Y. A. (2018). ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/173597

Chicago Manual of Style (16th Edition):

Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Masters Thesis, Texas A&M University. Accessed November 30, 2020. http://hdl.handle.net/1969.1/173597.

MLA Handbook (7th Edition):

Setiawan, Yanuar Ady. “ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH.” 2018. Web. 30 Nov 2020.

Vancouver:

Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Internet] [Masters thesis]. Texas A&M University; 2018. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/1969.1/173597.

Council of Science Editors:

Setiawan YA. ADVERSARY PATH ANALYSIS OF A PHYSICAL PROTECTION SYSTEM DESIGN USING A STOCHASTIC APPROACH. [Masters Thesis]. Texas A&M University; 2018. Available from: http://hdl.handle.net/1969.1/173597


North Carolina State University

13. McKinney, Steven. Insider Threat: User Identification Via Process Profiling.

Degree: MS, Computer Networking, 2008, North Carolina State University

Subjects/Keywords: process profiling; user identification; insider threat

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

McKinney, S. (2008). Insider Threat: User Identification Via Process Profiling. (Thesis). North Carolina State University. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/1902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

McKinney, Steven. “Insider Threat: User Identification Via Process Profiling.” 2008. Thesis, North Carolina State University. Accessed November 30, 2020. http://www.lib.ncsu.edu/resolver/1840.16/1902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

McKinney, Steven. “Insider Threat: User Identification Via Process Profiling.” 2008. Web. 30 Nov 2020.

Vancouver:

McKinney S. Insider Threat: User Identification Via Process Profiling. [Internet] [Thesis]. North Carolina State University; 2008. [cited 2020 Nov 30]. Available from: http://www.lib.ncsu.edu/resolver/1840.16/1902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

McKinney S. Insider Threat: User Identification Via Process Profiling. [Thesis]. North Carolina State University; 2008. Available from: http://www.lib.ncsu.edu/resolver/1840.16/1902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Edith Cowan University

14. Mat Roni, Mohd Saiyidi. An analysis of insider dysfunctional behavours in an accounting information system environment.

Degree: 2015, Edith Cowan University

Insider deviant behaviour in Accounting Information Systems (AIS) has long been recognised as a threat to organisational AIS assets. The literature abounds with a plethora… (more)

Subjects/Keywords: Accounting information system; Partial least square; Dysfunctional behaviour; insider threat; Computer misuse; Computer abuse; Accounting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Mat Roni, M. S. (2015). An analysis of insider dysfunctional behavours in an accounting information system environment. (Thesis). Edith Cowan University. Retrieved from https://ro.ecu.edu.au/theses/1640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Mat Roni, Mohd Saiyidi. “An analysis of insider dysfunctional behavours in an accounting information system environment.” 2015. Thesis, Edith Cowan University. Accessed November 30, 2020. https://ro.ecu.edu.au/theses/1640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Mat Roni, Mohd Saiyidi. “An analysis of insider dysfunctional behavours in an accounting information system environment.” 2015. Web. 30 Nov 2020.

Vancouver:

Mat Roni MS. An analysis of insider dysfunctional behavours in an accounting information system environment. [Internet] [Thesis]. Edith Cowan University; 2015. [cited 2020 Nov 30]. Available from: https://ro.ecu.edu.au/theses/1640.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Mat Roni MS. An analysis of insider dysfunctional behavours in an accounting information system environment. [Thesis]. Edith Cowan University; 2015. Available from: https://ro.ecu.edu.au/theses/1640

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Iowa State University

15. Chung, Yung-Yu. Topics in Data Stream Sampling and Insider Threat Detection.

Degree: 2016, Iowa State University

 With the current explosion in the speed and volume of data, the conventional computation systems are not capable of dealing with large data efficiently. In… (more)

Subjects/Keywords: Distinct Sampling Method; Distributed Computation; Insider Threat Detection; Sampling Method; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, Y. (2016). Topics in Data Stream Sampling and Insider Threat Detection. (Thesis). Iowa State University. Retrieved from https://lib.dr.iastate.edu/etd/15282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chung, Yung-Yu. “Topics in Data Stream Sampling and Insider Threat Detection.” 2016. Thesis, Iowa State University. Accessed November 30, 2020. https://lib.dr.iastate.edu/etd/15282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chung, Yung-Yu. “Topics in Data Stream Sampling and Insider Threat Detection.” 2016. Web. 30 Nov 2020.

Vancouver:

Chung Y. Topics in Data Stream Sampling and Insider Threat Detection. [Internet] [Thesis]. Iowa State University; 2016. [cited 2020 Nov 30]. Available from: https://lib.dr.iastate.edu/etd/15282.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chung Y. Topics in Data Stream Sampling and Insider Threat Detection. [Thesis]. Iowa State University; 2016. Available from: https://lib.dr.iastate.edu/etd/15282

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of North Texas

16. Hashem, Yassir. Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors.

Degree: 2018, University of North Texas

Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However,… (more)

Subjects/Keywords: Computer security; Insider Threat Detection; Brain-computer Interface; Eye Tracking; Electroencephalography; Electrocardiogram; Mouse and Keystrokes Dynamics; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hashem, Y. (2018). Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors. (Thesis). University of North Texas. Retrieved from https://digital.library.unt.edu/ark:/67531/metadc1248460/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hashem, Yassir. “Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors.” 2018. Thesis, University of North Texas. Accessed November 30, 2020. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hashem, Yassir. “Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors.” 2018. Web. 30 Nov 2020.

Vancouver:

Hashem Y. Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors. [Internet] [Thesis]. University of North Texas; 2018. [cited 2020 Nov 30]. Available from: https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hashem Y. Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors. [Thesis]. University of North Texas; 2018. Available from: https://digital.library.unt.edu/ark:/67531/metadc1248460/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Missouri University of Science and Technology

17. Balasubramanian, Krishna Prasad. Insider attack scenarios and black box testing in support of insider threat detection.

Degree: M.S. in Computer Engineering, Computer Engineering, Missouri University of Science and Technology

  "Insider threat detection is a major problem. Studies show that the extent of damage that could be caused by insiders is much more extensive… (more)

Subjects/Keywords: Insider threat detection; Intrustion Detection Systems; Computer Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Balasubramanian, K. P. (n.d.). Insider attack scenarios and black box testing in support of insider threat detection. (Masters Thesis). Missouri University of Science and Technology. Retrieved from https://scholarsmine.mst.edu/masters_theses/2381

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Chicago Manual of Style (16th Edition):

Balasubramanian, Krishna Prasad. “Insider attack scenarios and black box testing in support of insider threat detection.” Masters Thesis, Missouri University of Science and Technology. Accessed November 30, 2020. https://scholarsmine.mst.edu/masters_theses/2381.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

MLA Handbook (7th Edition):

Balasubramanian, Krishna Prasad. “Insider attack scenarios and black box testing in support of insider threat detection.” Web. 30 Nov 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

Balasubramanian KP. Insider attack scenarios and black box testing in support of insider threat detection. [Internet] [Masters thesis]. Missouri University of Science and Technology; [cited 2020 Nov 30]. Available from: https://scholarsmine.mst.edu/masters_theses/2381.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Council of Science Editors:

Balasubramanian KP. Insider attack scenarios and black box testing in support of insider threat detection. [Masters Thesis]. Missouri University of Science and Technology; Available from: https://scholarsmine.mst.edu/masters_theses/2381

Note: this citation may be lacking information needed for this citation format:
No year of publication.


University of Plymouth

18. Magklaras, Georgios Vasilios. An insider misuse threat detection and prediction language.

Degree: PhD, 2012, University of Plymouth

 Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the… (more)

Subjects/Keywords: 005.8; information security : insider IT misuse : threat signatures : intrusion detection : forensics : log engines : domain specific languages

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Magklaras, G. V. (2012). An insider misuse threat detection and prediction language. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/1024

Chicago Manual of Style (16th Edition):

Magklaras, Georgios Vasilios. “An insider misuse threat detection and prediction language.” 2012. Doctoral Dissertation, University of Plymouth. Accessed November 30, 2020. http://hdl.handle.net/10026.1/1024.

MLA Handbook (7th Edition):

Magklaras, Georgios Vasilios. “An insider misuse threat detection and prediction language.” 2012. Web. 30 Nov 2020.

Vancouver:

Magklaras GV. An insider misuse threat detection and prediction language. [Internet] [Doctoral dissertation]. University of Plymouth; 2012. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/10026.1/1024.

Council of Science Editors:

Magklaras GV. An insider misuse threat detection and prediction language. [Doctoral Dissertation]. University of Plymouth; 2012. Available from: http://hdl.handle.net/10026.1/1024


Arizona State University

19. Nolastname, Sharad. A Model for Calculating Damage Potential in Computer Systems.

Degree: Computer Science, 2019, Arizona State University

Subjects/Keywords: Computer science; Availability Attack; Insider attack; Threat Value

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Nolastname, S. (2019). A Model for Calculating Damage Potential in Computer Systems. (Masters Thesis). Arizona State University. Retrieved from http://repository.asu.edu/items/53889

Chicago Manual of Style (16th Edition):

Nolastname, Sharad. “A Model for Calculating Damage Potential in Computer Systems.” 2019. Masters Thesis, Arizona State University. Accessed November 30, 2020. http://repository.asu.edu/items/53889.

MLA Handbook (7th Edition):

Nolastname, Sharad. “A Model for Calculating Damage Potential in Computer Systems.” 2019. Web. 30 Nov 2020.

Vancouver:

Nolastname S. A Model for Calculating Damage Potential in Computer Systems. [Internet] [Masters thesis]. Arizona State University; 2019. [cited 2020 Nov 30]. Available from: http://repository.asu.edu/items/53889.

Council of Science Editors:

Nolastname S. A Model for Calculating Damage Potential in Computer Systems. [Masters Thesis]. Arizona State University; 2019. Available from: http://repository.asu.edu/items/53889


Purdue University

20. Hegde, Prajwal B. Monitoring DBMS activity to detect insider threat using query selectivity.

Degree: MS, Interdisciplinary Studies, 2016, Purdue University

  The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider(more)

Subjects/Keywords: Information Technology; Applied sciences; Anomaly detection mechanism; Information security; Insider threat; Query optimizer; Query selectivity; Relational database management systems; Computer Engineering; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hegde, P. B. (2016). Monitoring DBMS activity to detect insider threat using query selectivity. (Thesis). Purdue University. Retrieved from https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Thesis, Purdue University. Accessed November 30, 2020. https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hegde, Prajwal B. “Monitoring DBMS activity to detect insider threat using query selectivity.” 2016. Web. 30 Nov 2020.

Vancouver:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Internet] [Thesis]. Purdue University; 2016. [cited 2020 Nov 30]. Available from: https://docs.lib.purdue.edu/open_access_theses/952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hegde PB. Monitoring DBMS activity to detect insider threat using query selectivity. [Thesis]. Purdue University; 2016. Available from: https://docs.lib.purdue.edu/open_access_theses/952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Queensland University of Technology

21. Salim, Farzad. Approaches to access control under uncertainty.

Degree: 2012, Queensland University of Technology

 The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job -… (more)

Subjects/Keywords: information security; access control model; role based access control; usage control; insider threat; economics; game theory; agency theory; uncertainty; information asymmetry; incentives; audit; accountability; healthcare; data breach

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Salim, F. (2012). Approaches to access control under uncertainty. (Thesis). Queensland University of Technology. Retrieved from https://eprints.qut.edu.au/58408/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Salim, Farzad. “Approaches to access control under uncertainty.” 2012. Thesis, Queensland University of Technology. Accessed November 30, 2020. https://eprints.qut.edu.au/58408/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Salim, Farzad. “Approaches to access control under uncertainty.” 2012. Web. 30 Nov 2020.

Vancouver:

Salim F. Approaches to access control under uncertainty. [Internet] [Thesis]. Queensland University of Technology; 2012. [cited 2020 Nov 30]. Available from: https://eprints.qut.edu.au/58408/.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Salim F. Approaches to access control under uncertainty. [Thesis]. Queensland University of Technology; 2012. Available from: https://eprints.qut.edu.au/58408/

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Jenkins, Jeffrey Lyne. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .

Degree: 2013, University of Arizona

Insider threats – trusted members of an organization who compromise security – are considered the greatest security threat to organizations. Because of ignorance, negligence, or malicious intent,… (more)

Subjects/Keywords: Information Systems; Insider Threat; Mouse Movements; Passwords; Security; Management; Experiment

…91 Figure 13. Example insider threat question… …125 10 LIST OF TABLES Table 1. Common non-malicious and malicious insider threat… …explains how different types of training alleviate non-malicious insider threat activities. I… …alleviating the non-malicious insider threat; however, they have limited utility when an insider… …threats. The tool monitors mouse movements during an insider threat screening survey to detect… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jenkins, J. L. (2013). Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/297023

Chicago Manual of Style (16th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Doctoral Dissertation, University of Arizona. Accessed November 30, 2020. http://hdl.handle.net/10150/297023.

MLA Handbook (7th Edition):

Jenkins, Jeffrey Lyne. “Alleviating Insider Threats: Mitigation Strategies and Detection Techniques .” 2013. Web. 30 Nov 2020.

Vancouver:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Internet] [Doctoral dissertation]. University of Arizona; 2013. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/10150/297023.

Council of Science Editors:

Jenkins JL. Alleviating Insider Threats: Mitigation Strategies and Detection Techniques . [Doctoral Dissertation]. University of Arizona; 2013. Available from: http://hdl.handle.net/10150/297023


University of Tennessee – Knoxville

23. Udoeyop, Akaninyene Walter. Cyber Profiling for Insider Threat Detection.

Degree: MS, Computer Engineering, 2010, University of Tennessee – Knoxville

 Cyber attacks against companies and organizations can result in high impact losses that include damaged credibility, exposed vulnerability, and financial losses. Until the 21st century,… (more)

Subjects/Keywords: insider threat; cyber crime; insider; cyber security; anomaly detection; data breach; Computer and Systems Architecture; Digital Communications and Networking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Udoeyop, A. W. (2010). Cyber Profiling for Insider Threat Detection. (Thesis). University of Tennessee – Knoxville. Retrieved from https://trace.tennessee.edu/utk_gradthes/756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Udoeyop, Akaninyene Walter. “Cyber Profiling for Insider Threat Detection.” 2010. Thesis, University of Tennessee – Knoxville. Accessed November 30, 2020. https://trace.tennessee.edu/utk_gradthes/756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Udoeyop, Akaninyene Walter. “Cyber Profiling for Insider Threat Detection.” 2010. Web. 30 Nov 2020.

Vancouver:

Udoeyop AW. Cyber Profiling for Insider Threat Detection. [Internet] [Thesis]. University of Tennessee – Knoxville; 2010. [cited 2020 Nov 30]. Available from: https://trace.tennessee.edu/utk_gradthes/756.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Udoeyop AW. Cyber Profiling for Insider Threat Detection. [Thesis]. University of Tennessee – Knoxville; 2010. Available from: https://trace.tennessee.edu/utk_gradthes/756

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

24. Wunderlich, Jacinda L. The Insider Threat.

Degree: 2011, Regis University

 The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus… (more)

Subjects/Keywords: Computer Sciences; Physical Sciences and Mathematics; computer network security architecture; information technology; insider threat; Master in Systems Engineering thesis; College for Professional Studies; MS Systems Engineering; School of Computer & Information Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wunderlich, J. L. (2011). The Insider Threat. (Thesis). Regis University. Retrieved from http://epublications.regis.edu/theses/636

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wunderlich, Jacinda L. “The Insider Threat.” 2011. Thesis, Regis University. Accessed November 30, 2020. http://epublications.regis.edu/theses/636.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wunderlich, Jacinda L. “The Insider Threat.” 2011. Web. 30 Nov 2020.

Vancouver:

Wunderlich JL. The Insider Threat. [Internet] [Thesis]. Regis University; 2011. [cited 2020 Nov 30]. Available from: http://epublications.regis.edu/theses/636.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wunderlich JL. The Insider Threat. [Thesis]. Regis University; 2011. Available from: http://epublications.regis.edu/theses/636

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Texas – Austin

25. Durán, Felicia Angélica. Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials.

Degree: PhD, Mechanical Engineering, 2010, University of Texas – Austin

 Safeguards and security (S&S) systems for nuclear facilities include material control and accounting (MC&A) and a physical protection system (PPS) to protect nuclear materials from… (more)

Subjects/Keywords: Insider threat; Material control and accounting; Human reliability analysis; Vulnerability analysis; Probabilistic path analysis; Nuclear facilities

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Durán, F. A. (2010). Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. (Doctoral Dissertation). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/ETD-UT-2010-12-2223

Chicago Manual of Style (16th Edition):

Durán, Felicia Angélica. “Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials.” 2010. Doctoral Dissertation, University of Texas – Austin. Accessed November 30, 2020. http://hdl.handle.net/2152/ETD-UT-2010-12-2223.

MLA Handbook (7th Edition):

Durán, Felicia Angélica. “Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials.” 2010. Web. 30 Nov 2020.

Vancouver:

Durán FA. Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. [Internet] [Doctoral dissertation]. University of Texas – Austin; 2010. [cited 2020 Nov 30]. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2223.

Council of Science Editors:

Durán FA. Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. [Doctoral Dissertation]. University of Texas – Austin; 2010. Available from: http://hdl.handle.net/2152/ETD-UT-2010-12-2223

.