Home >Unlabelled > Deriving Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data Technical Note Published
Deriving Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and Data Technical Note Published
Posted on Monday, 17 January 2011 by admin
This paper demonstrates how to extract and map technical information from previous insider crimes.
Blog Archive
-
▼
2011
(234)
- December (14)
- November (4)
- October (58)
- September (84)
- August (18)
- July (7)
- June (6)
- May (5)
- April (7)
- March (6)
- February (12)
- January (13)
-
►
2010
(74)
- December (12)
- November (7)
- October (10)
- September (12)
- August (6)
- July (4)
- June (9)
- May (6)
- April (3)
- March (1)
- February (4)
-
►
2009
(28)
- December (1)
- November (2)
- October (1)
- August (1)
- July (5)
- June (1)
- May (1)
- April (4)
- March (4)
- February (2)
- January (6)