Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. Greitzer, F. L., Strozer, J. R., Cohen, S., Moore, A. P., Mundie, D. A., & Cowley, J. In IEEE Symposium on Security and Privacy Workshops, pages 236-250, 2014. IEEE Computer Society. Link Paper bibtex @inproceedings{conf/sp/GreitzerSCMMC14,
added-at = {2015-04-30T00:00:00.000+0200},
author = {Greitzer, Frank L. and Strozer, Jeremy R. and Cohen, Sholom and Moore, Andrew P. and Mundie, David A. and Cowley, Jennifer},
biburl = {http://www.bibsonomy.org/bibtex/24fdca4d74fcbe5177d7561baad5715d0/dblp},
booktitle = {IEEE Symposium on Security and Privacy Workshops},
crossref = {conf/sp/2014w},
ee = {http://dx.doi.org/10.1109/SPW.2014.39},
interhash = {d9f6a6473804df233ce63a7b7872847f},
intrahash = {4fdca4d74fcbe5177d7561baad5715d0},
isbn = {978-1-4799-5103-1},
keywords = {dblp},
pages = {236-250},
publisher = {IEEE Computer Society},
timestamp = {2015-07-24T11:35:28.000+0200},
title = {Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.},
url = {http://dblp.uni-trier.de/db/conf/sp/spw2014.html#GreitzerSCMMC14},
year = 2014
}
Downloads: 0
{"_id":"dJuJQz2EuRoMzSSyq","bibbaseid":"greitzer-strozer-cohen-moore-mundie-cowley-analysisofunintentionalinsiderthreatsderivingfromsocialengineeringexploits-2014","downloads":0,"creationDate":"2015-12-18T06:38:09.642Z","title":"Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.","author_short":["Greitzer, F. L.","Strozer, J. R.","Cohen, S.","Moore, A. P.","Mundie, D. A.","Cowley, J."],"year":2014,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/cohen?items=1000","bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-04-30T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Greitzer"],"firstnames":["Frank","L."],"suffixes":[]},{"propositions":[],"lastnames":["Strozer"],"firstnames":["Jeremy","R."],"suffixes":[]},{"propositions":[],"lastnames":["Cohen"],"firstnames":["Sholom"],"suffixes":[]},{"propositions":[],"lastnames":["Moore"],"firstnames":["Andrew","P."],"suffixes":[]},{"propositions":[],"lastnames":["Mundie"],"firstnames":["David","A."],"suffixes":[]},{"propositions":[],"lastnames":["Cowley"],"firstnames":["Jennifer"],"suffixes":[]}],"biburl":"http://www.bibsonomy.org/bibtex/24fdca4d74fcbe5177d7561baad5715d0/dblp","booktitle":"IEEE Symposium on Security and Privacy Workshops","crossref":"conf/sp/2014w","ee":"http://dx.doi.org/10.1109/SPW.2014.39","interhash":"d9f6a6473804df233ce63a7b7872847f","intrahash":"4fdca4d74fcbe5177d7561baad5715d0","isbn":"978-1-4799-5103-1","keywords":"dblp","pages":"236-250","publisher":"IEEE Computer Society","timestamp":"2015-07-24T11:35:28.000+0200","title":"Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.","url":"http://dblp.uni-trier.de/db/conf/sp/spw2014.html#GreitzerSCMMC14","year":"2014","bibtex":"@inproceedings{conf/sp/GreitzerSCMMC14,\n added-at = {2015-04-30T00:00:00.000+0200},\n author = {Greitzer, Frank L. and Strozer, Jeremy R. and Cohen, Sholom and Moore, Andrew P. and Mundie, David A. and Cowley, Jennifer},\n biburl = {http://www.bibsonomy.org/bibtex/24fdca4d74fcbe5177d7561baad5715d0/dblp},\n booktitle = {IEEE Symposium on Security and Privacy Workshops},\n crossref = {conf/sp/2014w},\n ee = {http://dx.doi.org/10.1109/SPW.2014.39},\n interhash = {d9f6a6473804df233ce63a7b7872847f},\n intrahash = {4fdca4d74fcbe5177d7561baad5715d0},\n isbn = {978-1-4799-5103-1},\n keywords = {dblp},\n pages = {236-250},\n publisher = {IEEE Computer Society},\n timestamp = {2015-07-24T11:35:28.000+0200},\n title = {Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits.},\n url = {http://dblp.uni-trier.de/db/conf/sp/spw2014.html#GreitzerSCMMC14},\n year = 2014\n}\n\n","author_short":["Greitzer, F. L.","Strozer, J. R.","Cohen, S.","Moore, A. P.","Mundie, D. A.","Cowley, J."],"key":"conf/sp/GreitzerSCMMC14","id":"conf/sp/GreitzerSCMMC14","bibbaseid":"greitzer-strozer-cohen-moore-mundie-cowley-analysisofunintentionalinsiderthreatsderivingfromsocialengineeringexploits-2014","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/SPW.2014.39","Paper":"http://dblp.uni-trier.de/db/conf/sp/spw2014.html#GreitzerSCMMC14"},"keyword":["dblp"],"downloads":0},"search_terms":["analysis","unintentional","insider","threats","deriving","social","engineering","exploits","greitzer","strozer","cohen","moore","mundie","cowley"],"keywords":["dblp"],"authorIDs":[],"dataSources":["DY7iBA8E4Z4ZyQgtk"]}