Computer security incident response team development and evolution R Ruefle, A Dorofee, D Mundie, AD Householder, M Murray, SJ Perl IEEE Security & Privacy 12 (5), 16-26, 2014 | 99 | 2014 |
An Ontology for Insider Threat Indicators: Development and Application. D Costa, M Collins, SJ Perl, M Albrethsen, G Silowash, D Spooner STIDS, 48-53, 2014 | 57 | 2014 |
An insider threat indicator ontology DL Costa, MJ Albrethsen, ML Collins, SJ Perl, GJ Silowash, DL Spooner Technical Report CMU/SEI-2016-TR-007, 2016 | 52 | 2016 |
An Incident Management Ontology. DA Mundie, R Ruefle, AJ Dorofee, SJ Perl, J McCloud, M Collins STIDS, 62-71, 2014 | 25 | 2014 |
Toward an ontology for insider threat research: Varieties of insider threat definitions DA Mundie, S Perl, CL Huth 2013 third workshop on socio-technical aspects in security and trust, 26-36, 2013 | 23 | 2013 |
Data mining for efficient collaborative information discovery B Woods, SJ Perl, B Lindauer Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015 | 18 | 2015 |
The critical role of positive incentives for reducing insider threats AP Moore, SJ Perl, J Cowley, ML Collins, TM Cassidy, N VanHoudnos, ... SEI Technical Report CMU/SEI-2016-TR-014, 2016 | 17 | 2016 |
Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior A AlQadheeb, S Bhattacharyya, S Perl Array 14, 100146, 2022 | 11 | 2022 |
Incident Management Capability Assessment A Dorofee, R Ruefle, M Zajicek, D McIntire, C Alberts, S Perl, CL Huth, ... CMU/SEI. URL: https://resources. sei. cmu. edu/asset_files/TechnicalReport …, 2018 | 8 | 2018 |
Insider threat indicator ontology (№ CMU/SEI-2016-TR-007) DL Costa, MJ Albrethsen, ML Collins, SJ Perl, GJ Silowash, DL Spooner Pittsburgh: Carnegie-Mellon University, 2016 | 7 | 2016 |
Insider Threat Defined: Discovering the Prototypical Case. DA Mundie, SJ Perl, CH JD J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 7-23, 2014 | 7 | 2014 |
A cognitive study of incident handling expertise SJ Perl, RO Young 27th Annual FIRST Conference, Berlin, 2015 | 4 | 2015 |
Assurance for CyberSecurity with Assume-Guarantee Reasoning A Alfageeh, S Bhattacharyya, S Perl, M Patel 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019 | 1 | 2019 |
CONSIDERATIONS FOR EVALUATING LARGE LANGUAGE MODELS FOR CYBERSECURITY TASKS J Gennari, S Lau, S Perl, J Parish, G Sastry | | 2024 |
DC3 DCISE Information Sharing Efforts S Perl, SEI CERT | | 2022 |
Introduction to MISP S Perl, SEI CERT | | 2021 |
Incident Management Capability Assessment Workbook A Dorofee, R Ruefle, M Zajicek, D McIntire, C Alberts, S Perl, CL Huth, ... | | 2018 |
Silverfish-Red Team Exercise N Mead, F Shull | | 2018 |
Information Discovery in Cybersecurity Incident Data Reported to DHS S Perl, R Ruefle, ... | | 2017 |
Discovering patterns of activity in unstructured incident reports at scale B Woods, S Perl | | 2015 |