Login / Signup
Carly L. Huth
Publication Activity (10 Years)
Years Active: 2012-2013
Publications (10 Years): 0
Top Topics
Data Leakage Prevention
Email
Statistical Methods
Insider Threat
Top Venues
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
STAST
Comput. Law Secur. Rev.
Inf. Syst. Frontiers
</>
Publications
</>
William R. Claycomb
,
Carly L. Huth
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
4 (4) (2013)
Carly L. Huth
,
David W. Chadwick
,
William R. Claycomb
,
Ilsun You
Guest editorial: A brief overview of data leakage and insider threats.
Inf. Syst. Frontiers
15 (1) (2013)
David A. Mundie
,
Samuel J. Perl
,
Carly L. Huth
Toward an Ontology for Insider Threat Research: Varieties of Insider Threat Definitions.
STAST
(2013)
Carly L. Huth
The insider threat and employee privacy: An overview of recent case law.
Comput. Law Secur. Rev.
29 (4) (2013)
William R. Claycomb
,
Carly L. Huth
,
Lori Flynn
,
David M. McIntire
,
Todd B. Lewellen
Chronological Examination of Insider Threat Sabotage: Preliminary Observations.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.
3 (4) (2012)