ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Insider Threat Research"

From ForensicsWiki
Jump to: navigation, search
m
m (Bibliography)
Line 1: Line 1:
 
==Bibliography==
 
==Bibliography==
 +
===US Government Reports===
 +
* [http://www.pnl.gov/coginformatics/media/pdf/tr-pacman-65204.pdf Predictive Modeling for Insider Threat Mitigation], PNNL-SA-65204, April 2009
 
* [http://www.dhra.mil/perserec/reports.html#TR0902 Insider Risk Evaluation and Audit], PERSEREC TR 09-02, August 2009
 
* [http://www.dhra.mil/perserec/reports.html#TR0902 Insider Risk Evaluation and Audit], PERSEREC TR 09-02, August 2009
 
* [http://www.dhra.mil/perserec/reports.html#TR0513 Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations], PERSEREC TR 05-15 September 2005
 
* [http://www.dhra.mil/perserec/reports.html#TR0513 Ten Tales of Betrayal: The Threat to Corporate Infrastructures by Information Technology Insiders Analysis and Observations], PERSEREC TR 05-15 September 2005

Revision as of 10:14, 18 September 2013

Bibliography

US Government Reports

External Links