Author:
Reveraert Mathias,Sauer Tom
Publisher
Springer Science and Business Media LLC
Subject
Law,Strategy and Management,Safety Research
Reference71 articles.
1. Albrechtsen, Eirik. Security vs safety. Semantic Scholar. Aug 2003. https://pdfs.semanticscholar.org/451c/18d9b07ecda89b367095c48582358a1f3c51.pdf. Accessed 13 Nov 2019.
2. BaMaung, David, David McIlhatton, Murdo MacDonald, and Rona Beattie. 2018. The Enemy Within? The Connection between Insider Threat and Terrorism. Studies in Conflict & Terrorism 41 (2): 133–150.
3. Becker, Howard. 1963. Outsiders. In Outsiders: Studies in the Socioloy of Deviance, ed. Howard Becker, 1–15. New York: The Free Press.
4. Bishop, Matt, Carrie Gates, Deb Frincke, and Frank L. Greitzer. AZALIA: an A to Z Assessment of the Likelihood of Insider Attack. In IEEE Conference on Technologies for Homeland Security: 385–392. Boston: IEEE, 2009.
5. Bishop, Matt, et al. 2010. A Risk Management Approach to the 'Insider Threat'. In Insider Threats in Cyber Security, ed. Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, and Matt Bishop, 115–137. Boston: Springer.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献