Carly L. Huth

According to our database1, Carly L. Huth authored at least 5 papers between 2012 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Guest editorial: A brief overview of data leakage and insider threats.
Inf. Syst. Frontiers, 2013

The insider threat and employee privacy: An overview of recent case law.
Comput. Law Secur. Rev., 2013

Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

2012
Chronological Examination of Insider Threat Sabotage: Preliminary Observations.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012


  Loading...