Follow
Andrew Moore
Andrew Moore
Software Engineering Institute
Verified email at cert.org
Title
Cited by
Cited by
Year
Attack modeling for information security and survivability
AP Moore, RJ Ellison, RC Linger
Carnegie Mellon University, Software Engineering Institute, 2001
5452001
The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)
DM Cappelli, AP Moore, RF Trzeciak
Addison-Wesley, 2012
4532012
The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)
DM Cappelli, AP Moore, RF Trzeciak
Addison-Wesley, 2012
4532012
Insider threat study: Computer system sabotage in critical infrastructure sectors
M Keeney, E Kowalski, D Cappelli, A Moore, T Shimeall, S Rogers
United States Secret Service, 2005
2922005
Insider threat study: Illicit cyber activity in the banking and finance sector
MR Randazzo, M Keeney, E Kowalski, D Cappelli, A Moore
United States Secret Service, 2004
2752004
Common sense guide to prevention and detection of insider threats
D Cappelli, A Moore, R Trzeciak, TJ Shimeall
version, 2009
203*2009
Combating the insider cyber threat
FL Greitzer, AP Moore, DM Cappelli, DH Andrews, LA Carroll, TD Hull
IEEE Security & Privacy 6 (1), 61-64, 2008
1652008
Combating the insider cyber threat
FL Greitzer, AP Moore, DM Cappelli, DH Andrews, LA Carroll, TD Hull
IEEE Security & Privacy 6 (1), 61-64, 2008
1652008
Common sense guide to mitigating insider threats
GJ Silowash, DM Cappelli, AP Moore, RF Trzeciak, T Shimeall, L Flynn
Carnegie Mellon University, 2012
1502012
The “big picture” of insider IT sabotage across US critical infrastructures
AP Moore, DM Cappelli, RF Trzeciak
Insider Attack and Cyber Security: Beyond the Hacker, 17-52, 2008
1492008
Comparing insider IT sabotage and espionage: A model-based analysis
SR Band, DM Cappelli, LF Fischer, AP Moore, ED Shaw, RF Trzeciak
CMU-CERT Program, Tech. Rep, 2006
1432006
Analysis of unintentional insider threats deriving from social engineering exploits
FL Greitzer, JR Strozer, S Cohen, AP Moore, D Mundie, J Cowley
2014 IEEE Security and Privacy Workshops, 236-250, 2014
1422014
A Preliminary Model of Insider Theft of Intellectual Property.
AP Moore, DM Cappelli, TC Caron, ED Shaw, D Spooner, RF Trzeciak
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (1), 28-49, 2011
902011
Preliminary system dynamics maps of the insider cyber-threat problem
DF Andersen, D Cappelli, JJ Gonzalez, M Mojtahedzadeh, A Moore, ...
Proceedings of the 22nd International Conference of the System dynamics …, 2004
892004
Insider threat study: Illicit cyber activity involving fraud in the US financial services sector
A Cummings, T Lewellen, D McIntire, AP Moore, R Trzeciak
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA …, 2012
862012
Unintentional insider threat: contributing factors, observables, and mitigation strategies
FL Greitzer, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, D Mundie
2014 47th Hawaii International Conference on System Sciences, 2025-2034, 2014
792014
Common sense guide to mitigating insider threats
M Collins, M Theis, R Trzeciak, J Strozer, J Clark, D Costa, T Cassidy, ...
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA …, 2016
762016
Insider threat study: Illicit cyber activity in the government sector
E Kowalski, T Conway, S Keverline, M Williams, D Cappelli, B Willke, ...
US Department of Homeland Security, United States Secret Service, 2008
702008
Insider threat study: Illicit cyber activity in the information technology and telecommunications sector
E Kowalski, D Cappelli, A Moore
United States Secret Service, 2008
682008
Design and assurance strategy for the NRL pump
MH Kang, AP Moore, IS Moskowitz
Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997
661997
The system can't perform the operation now. Try again later.
Articles 1–20