Threat agent library helps identify information security risks T Casey Intel White Paper 2, 2007 | 92 | 2007 |
Threat actor type inference and characterization within cyber threat intelligence V Mavroeidis, R Hohimer, T Casey, A Jesang 2021 13th International Conference on Cyber Conflict (CyCon), 327-352, 2021 | 60 | 2021 |
Understanding Cyberthreat Motivations to Improve Defense T Casey White paper - https://www.intel.com/content/dam/www/public/us/en/documents …, 2015 | 30 | 2015 |
The Cybersecurity Framework in Action: An Intel Use Case T Casey, K Fiftal, K Landfield, J Miller, D Morgan, B Willis Intel Corporation, 1-10, 2015 | 17 | 2015 |
Threat agents: A necessary component of threat analysis T Casey, P Koeberl, C Vishik Proceedings of the sixth annual workshop on cyber security and information …, 2010 | 17 | 2010 |
A field guide to insider threat T Casey Intel White paper, 2015 | 10 | 2015 |
Wargames: serious play that tests enterprise security assumptions T Casey, B Willis Intel Corporation, Tech. Rep., 2008 | 5* | 2008 |
Defining threat agents: Towards a more complete threat analysis T Casey, P Koeberl, C Vishik ISSE 2010 Securing Electronic Business Processes: Highlights of the …, 2011 | 4 | 2011 |
The Cybersecurity Framework in Action: An Intel Use Case, solution brief, Intel, 2015 T Casey | 2 | |