Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gates, Carrie
add a person with the name Gates, Carrie
 

Other publications of authors with the same name

Defender Personality Traits., and . WISI, volume 3917 of Lecture Notes in Computer Science, page 85-90. Springer, (2006)The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors., and . DIMVA, volume 5137 of Lecture Notes in Computer Science, page 228-246. Springer, (2008)A Risk Management Approach to the "Insider Threat"., , , , , , and . Insider Threats in Cyber Security, volume 49 of Advances in Information Security, Springer, (2010)Forgive and forget: return to obscurity., , , , and . NSPW, page 1-10. ACM, (2013)The security and privacy implications of using social networks to deliver healthcare., and . PETRA, ACM, (2010)Reflecting on visualization for cyber security., and . ISI, page 275-277. IEEE, (2013)NAF: The NetSA Aggregated Flow Tool Suite., and . LISA, page 221-231. USENIX, (2006)A Psychological Profile of Defender Personality Traits., and . JCP, 2 (2): 84-93 (2007)One of These Records Is Not Like the Others., and . TaPP, USENIX Association, (2011)Creating an Electronic Commerce Device Which Promotes Universal Access: The KALI Project., , and . DCW, volume 1830 of Lecture Notes in Computer Science, page 2-12. Springer, (2000)