| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2011 | — | book |
|
| 2011 | J | jnl |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | conf |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | — | ch. |
Insider Threats in Cyber Security
|
| 2010 | — | book |
|
| 2010 | — | book |
Insider Threats in Cyber Security
|
| 2010 | — | ed. |
Insider Threats: Strategies for Prevention, Mitigation, and Response
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2009 | — | conf |
WEIS
|
| 2009 | C | conf |
NSPW
|
| 2008 | — | conf |
Countering Insider Threats
|
| 2008 | — | conf |
Countering Insider Threats
|
| 2008 | — | conf |
Critical Infrastructure Protection
|
| 2008 | — | ed. |
Countering Insider Threats
|
| 2008 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | ch. |
Insider Attack and Cyber Security
|
| 2007 | C | conf |
NSPW
|
| 2002 | J | jnl |
Comput. Secur.
|