Jeffrey Hunker

19 papers C 2Journal 4Unranked 6
YearRankTypeTitle / Venue / Authors
2011 book
Jeffrey Hunker
2011 J jnl
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
Jeffrey Hunker, Christian W. Probst
2010 conf
Insider Threats: Strategies for Prevention, Mitigation, and Response
Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst
2010 conf
Insider Threats: Strategies for Prevention, Mitigation, and Response
Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst
2010 ch.
Insider Threats in Cyber Security
Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
2010 book
Jeffrey Hunker
2010 book
Insider Threats in Cyber Security
Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
2010 ed.
Insider Threats: Strategies for Prevention, Mitigation, and Response
Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst
2010 J jnl
IEEE Trans. Inf. Forensics Secur.
Shari Lawrence Pfleeger, Joel B. Predd, Jeffrey Hunker, Carla Bulford
2009 conf
WEIS
Christian W. Probst, Jeffrey Hunker
2009 C conf
NSPW
Matt Bishop, Carrie Gates, Jeffrey Hunker
2008 conf
Countering Insider Threats
Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst
2008 conf
Countering Insider Threats
Christian W. Probst, Jeffrey Hunker, Matt Bishop, Dieter Gollmann
2008 conf
Critical Infrastructure Protection
Jeffrey Hunker, Robert Hutchinson, Jonathan Margulies
2008 ed.
Countering Insider Threats
Matt Bishop, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst
2008 J jnl
IEEE Secur. Priv.
Joel B. Predd, Shari Lawrence Pfleeger, Jeffrey Hunker, Carla Bulford
2008 ch.
Insider Attack and Cyber Security
Jeffrey Hunker
2007 C conf
NSPW
Jeffrey Hunker
2002 J jnl
Comput. Secur.
Jeffrey Hunker