search
menu
icon-carat-right
cmu-wordmark
✕
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
Enterprise Risk and Resilience Management
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity and Inclusion
Internship Opportunities
Working at the SEI
Carnegie Mellon University
Software Engineering Institute
About
Leadership
Divisions
Work with Us
Collaboration with CMU
History of Innovation at the SEI
Our Work
Agile
Artificial Intelligence Engineering
Cloud Computing
Cyber Workforce Development
Cybersecurity Center Development
Cybersecurity Engineering
DevSecOps
All Topics
All Projects
Publications
Annual Reviews
Blog
Digital Library
Podcast Series
Software and Tools
Technical Papers
Vulnerability Notes Database
Webcasts Series
News and Events
News
Events
SEI Bulletin
Education and Outreach
Courses
Credentials
Curricula
License SEI Materials
Careers
Job Openings
Diversity, Equity, and Inclusion
Internship Opportunities
Home
Publications
Authors
Todd Lewellen
Todd Lewellen
All
Tech Publications
Blog Posts
2016 Emerging Technology Domains Risk Survey
April 8, 2016
•
Technical Report
By
Christopher King
,
Dan J. Klinedinst
,
Todd Lewellen
,
Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
October 3, 2013
•
Technical Note
By
Todd Lewellen
,
George Silowash
,
Daniel L. Costa
Tempering the Vulnerability Hype Cycle with CVSS
August 8, 2013
•
Blog Post
By
Todd Lewellen
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
March 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
,
Joshua W. Burns
,
Daniel L. Costa
Common Sense Guide to Mitigating Insider Threats - Best Practice 11 (of 19)
January 25, 2013
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
More from Todd Lewellen
2016 Emerging Technology Domains Risk Survey
April 8, 2016
•
Technical Report
By
Christopher King
,
Dan J. Klinedinst
,
Todd Lewellen
,
Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
October 3, 2013
•
Technical Note
By
Todd Lewellen
,
George Silowash
,
Daniel L. Costa
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
March 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
,
Joshua W. Burns
,
Daniel L. Costa
Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
January 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
December 1, 2012
•
White Paper
By
William R. Claycomb
,
Carly L. Huth
,
Lori Flynn
,
David McIntire
,
Todd Lewellen
More from Todd Lewellen
Tempering the Vulnerability Hype Cycle with CVSS
August 8, 2013
•
Blog Post
By
Todd Lewellen
Common Sense Guide to Mitigating Insider Threats - Best Practice 11 (of 19)
January 25, 2013
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
"Spotlight On: Insider Threat from Trusted Business Partners" Article Revised and Released
November 2, 2012
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
Insider Threats Evident in All Industry Sectors
September 7, 2012
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
More from Todd Lewellen