Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gates, Carrie
add a person with the name Gates, Carrie
 

Other publications of authors with the same name

A Risk Management Approach to the "Insider Threat"., , , , , , and . Insider Threats in Cyber Security, volume 49 of Advances in Information Security, Springer, (2010)Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors., and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 228-246. Springer, (2008)Forgive and forget: return to obscurity., , , , and . NSPW, page 1-10. ACM, (2013)The security and privacy implications of using social networks to deliver healthcare., and . PETRA, ACM, (2010)NAF: The NetSA Aggregated Flow Tool Suite., and . LISA, page 221-231. USENIX, (2006)Reflecting on visualization for cyber security., and . ISI, page 275-277. IEEE, (2013)A Psychological Profile of Defender Personality Traits., and . JCP, 2 (2): 84-93 (2007)One of These Records Is Not Like the Others., and . TaPP, USENIX Association, (2011)Over flow: An overview visualization for network analysis., , , , , , and . VizSEC, page 11-19. IEEE Computer Society, (2009)