1. Band, S., Coppelli, D., Fischer, L., Moore, A., Shaw, E. and Trzeciak, R. December 2006. “Comparing insider IT sabotage and espionage: A model-based analysis”. December, SEI, Carnegie Mellon University. Technical report CMU/SEI- 2006-TR-026, ESC-TR-2006-091
2. Cappelli, D. and Montelibano, J. February 2011. “Combat IT sabotage: Technical solutions from the CERT insider threat lab”. February, San Francisco, CA: RSA Conference, Session ID HT2-108.
3. Cappelli, D. June 2011. “Insider threats: Actual attacks by current and former software engineers”. June, Dublin, Ireland: SEPG Conference.
4. Statistical profiling and visualization for detection of malicious insider attacks on computer networks
5. Defense Advanced Research Projects Agency (DARPA). October 2010. “Anomaly detection at multiple scales (ADAMS)”. October, DARPA-BAA-11-04.