Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 8 of 8 results for the Author - david mcintire

Technical Note | December 2014 - Technical Note Pattern-Based Design of Insider Threat Programs By Andrew P. Moore, Matthew L. Collins, Dave Mundie, Robin Ruefle, David McIntire

In this report, the authors describe a pattern-based approach to designing insider threat programs that could provide a better defense against insider threats.

Technical Note | February 2013 - Technical Note The MAL: A Malware Analysis Lexicon By Dave Mundie, David McIntire

In this report, the authors present results of the Malware Analysis Lexicon (MAL) initiative, which developed the first common vocabulary for malware analysis.

Technical Report | August 2014 - Technical Report A Systematic Approach for Assessing Workforce Readiness By Christopher J. Alberts, David McIntire

In this report, the authors present the Competency Lifecycle Roadmap and the readiness test development method, both used to maintain workforce readiness.

Technical Note | March 2013 - Technical Note Justification of a Pattern for Detecting Intellectual Property ... By Andrew P. Moore, David McIntire, Dave Mundie, David Zubrow

In this report, the authors justify applying the pattern “Increased Review for Intellectual Property (IP) Theft by Departing Insiders.”

Technical Report | July 2013 - Technical Report Results of SEI Line-Funded Exploratory New Starts Projects ... By Bjorn Andersson, Lori Flynn, David P. Gluch, Dennis Goldenson, Arie Gurfinkel, Jeff Havrilla, Chuck Hines, John J. Hudak, Carly L. Huth, Wesley Jin, Rick Kazman, Stephany Bellomo, Mary Ann Lapham, James McCurley, John McGregor, David McIntire, Robert Nord, Ipek Ozkaya, Brittany Phillips, Robert W. Stoddard, David Zubrow, Lisa Brownsword, Yuanfang Cai (Drexel University), Sagar Chaki, William R. Claycomb, Julie B. Cohen, Peter H. Feiler, Robert Ferguson

This report describes line-funded exploratory new starts (LENS) projects that were conducted during fiscal year 2012 (October 2011 through September 2012).

White Paper | December 2012 - White Paper Chronological Examination of Insider Threat Sabotage ... By William R. Claycomb, Carly L. Huth, Lori Flynn, David McIntire, Todd Lewellen

In this paper, the authors examine 15 cases of insider threat sabotage of IT systems to identify points in the attack time-line.

Conference Paper | October 2013 - Conference Paper Four Insider IT Sabotage Mitigation Patterns and an Initial ... By Lori Flynn, Jason W. Clark, Andrew P. Moore, Matthew L. Collins, Eleni Tsamitis, Dave Mundie, David McIntire

In this paper, the authors describe four patterns of insider IT sabotage mitigation and initial results from 46 relevant cases for pattern effectiveness.

Special Report | July 2012 - Special Report Insider Threat Study: Illicit Cyber Activity Involving Fraud in the ... By Adam Cummings, Todd Lewellen, David McIntire, Andrew P. Moore, Randall F. Trzeciak

In this report, the authors describe insights and risk indicators of malicious insider activity in the banking and finance sector.