Showing 1 - 10 of 11 results for the Author - carnegie mellon university) , Type - White Paper
In this paper, the authors describe the development of a secure coding module that shows how to capture content, ensure learning, and scale to meet demand.
In this paper, the authors describe the MERIT insider threat model and simulation results.
In this paper, the authors describe general observations about, and a preliminary system dynamics model of, insider crime based on our empirical data.
In this paper, the authors describe the who, what, when, where, and how of attacks by insiders using programming techniques and includes case examples.
In this paper, the authors describe the Vulnerability Response Decision Assistance (VRDA) framework, a decision support and expert system.
In this paper, the authors present the as-if infinitely ranged (AIR) integer model, which provides a mechanism for eliminating integral exceptional conditions.
In this article, the authors focus on cases in which the malicious insider was employed by a trusted business partner of the victim organization.
In this presentation, Joseph B. Kadane discusses how Bayesian methods help make the logistic regression approach to scan data stable and operationally feasible.
In this report, the authors focus on persons who use programming techniques to commit malicious acts against their organizations.
This thesis describes a static taint analysis for Android that combines the FlowDroid and Epicc analyses to track inter- and intra-component data flow.