Cognitive science implications for enhancing training effectiveness in a serious gaming context FL Greitzer, OA Kuchar, K Huston Journal on Educational Resources in Computing (JERIC) 7 (3), 2-es, 2007 | 401 | 2007 |
Diagnostics/prognostics using wireless links BW Wilson, E Heister, FL Greitzer US Patent 6,662,091, 2003 | 248 | 2003 |
Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation FL Greitzer, DA Frincke Insider threats in cyber security, 85-113, 2010 | 184 | 2010 |
Modeling human behavior to anticipate insider attacks FL Greitzer, RE Hohimer Journal of Strategic Security 4 (2), 25-48, 2011 | 176 | 2011 |
Combating the insider cyber threat FL Greitzer, AP Moore, DM Cappelli, DH Andrews, LA Carroll, TD Hull IEEE Security & Privacy 6 (1), 61-64, 2008 | 169 | 2008 |
Analysis of unintentional insider threats deriving from social engineering exploits FL Greitzer, JR Strozer, S Cohen, AP Moore, D Mundie, J Cowley 2014 IEEE Security and Privacy Workshops, 236-250, 2014 | 144 | 2014 |
Diagnostics/prognostics using wireless links BW Wilson, E Heister, FL Greitzer US Patent 6,941,202, 2005 | 110 | 2005 |
Identifying at-risk employees: Modeling psychosocial precursors of potential insider threats FL Greitzer, LJ Kangas, CF Noonan, AC Dalton, RE Hohimer 2012 45th Hawaii International Conference on System Sciences, 2392-2401, 2012 | 108 | 2012 |
Unintentional insider threat: contributing factors, observables, and mitigation strategies FL Greitzer, J Strozer, S Cohen, J Bergey, J Cowley, A Moore, D Mundie 2014 47th Hawaii International Conference on System Sciences, 2025-2034, 2014 | 88 | 2014 |
Method and apparatus to predict the remaining service life of an operating system FL Greitzer, LJ Kangas, KM Terrones, MA Maynard, RA Pawlowski, ... US Patent 7,457,785, 2008 | 84 | 2008 |
A Cognitive Approach to Student-Centered E-Learning FL Greitzer proceedings of the human factors and ergonomics society annual meeting 46 …, 2002 | 79 | 2002 |
Naturalistic decision making for power system operators FL Greitzer, R Podmore, M Robinson, P Ey Intl. Journal of Human–Computer Interaction 26 (2-3), 278-291, 2010 | 75 | 2010 |
A risk management approach to the “insider threat” M Bishop, S Engle, DA Frincke, C Gates, FL Greitzer, S Peisert, S Whalen Insider threats in cyber security, 115-137, 2010 | 74 | 2010 |
Organization and study time in learning from reading. MP Friedman, FL Greitzer Journal of Educational Psychology 63 (6), 609, 1972 | 70 | 1972 |
Identifying at-risk employees: A behavioral model for predicting potential insider threats FL Greitzer, LJ Kangas, CF Noonan, AC Dalton Pacific Northwest National Lab.(PNNL), Richland, WA (United States), 2010 | 68 | 2010 |
Experimental investigation of technical and human factors related to phishing susceptibility FL Greitzer, W Li, KB Laskey, J Lee, J Purl ACM Transactions on Social Computing 4 (2), 1-48, 2021 | 65 | 2021 |
Experimental investigation of demographic factors related to phishing susceptibility W Li, J Lee, J Purl, F Greitzer, B Yousefi, K Laskey | 62 | 2020 |
Gas turbine engine health monitoring and prognostics FL Greitzer, LJ Kangas, KM Terrones, MA Maynard, BW Wilson, ... International Society of Logistics (SOLE) 1999 Symposium, Las Vegas, Nevada …, 1999 | 61 | 1999 |
Predicting insider threat risks through linguistic analysis of electronic communication CR Brown, A Watkins, FL Greitzer 2013 46th Hawaii International Conference on System Sciences, 1849-1858, 2013 | 58 | 2013 |
Insider threats: It's the human, stupid! FL Greitzer proceedings of the northwest cybersecurity symposium, 1-8, 2019 | 52 | 2019 |