icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
William R. Claycomb
William R. Claycomb
Software Engineering Institute
All
Tech Publications
Blog Posts
Videos
Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation
September 7, 2022
•
Conference Paper
By
Carrie Gardner
,
William R. Claycomb
Implementing Cyber Security in DoD Supply Chains
December 15, 2020
•
Video
By
William R. Claycomb
Common Sense Guide to Mitigating Insider Threats, Sixth Edition
February 27, 2019
•
Technical Report
By
Michael C. Theis
,
Randall F. Trzeciak
,
Daniel L. Costa
,
Andrew P. Moore
,
Sarah Miller
,
Tracy Cassidy
,
William R. Claycomb
Insider Threat Mitigation Posters (SEI 2015 Research Review)
October 21, 2015
•
Poster
By
William R. Claycomb
,
Andrew P. Moore
Insider Threat Mitigation
October 16, 2015
•
Presentation
By
William R. Claycomb
,
Andrew P. Moore
More from William Claycomb
Common Sense Guide to Mitigating Insider Threats, Sixth Edition
February 27, 2019
•
Technical Report
By
Michael C. Theis
,
Randall F. Trzeciak
,
Daniel L. Costa
,
Andrew P. Moore
,
Sarah Miller
,
Tracy Cassidy
,
William R. Claycomb
Insider Threat Mitigation Posters (SEI 2015 Research Review)
October 21, 2015
•
Poster
By
William R. Claycomb
,
Andrew P. Moore
Deep Focus: Increasing User “Depth of Field” to Improve Threat Detection
October 28, 2014
•
Poster
By
William R. Claycomb
,
Roy Maxion (Carnegie Mellon CyLab)
Insider Threat Mitigation Project
October 28, 2014
•
Poster
By
Kathleen Carley (Carnegie Mellon School of Computer Science)
,
Neal Altman
,
Geoff Morgan (Carnegie Mellon School of Computer Science)
,
Matt Benigni (Carnegie Mellon School of Computer Science)
,
Matthew L. Collins
,
Andrew P. Moore
,
William R. Claycomb
Results of SEI Line-Funded Exploratory New Starts Projects: FY 2012
July 1, 2013
•
Technical Report
By
Bjorn Andersson
,
Stephany Bellomo
,
Lisa Brownsword
,
Yuanfang Cai (Drexel University)
,
Sagar Chaki
,
William R. Claycomb
,
Julie B. Cohen
,
Peter H. Feiler
,
Robert Ferguson
,
Lori Flynn
,
David P. Gluch
,
Dennis Goldenson
,
Arie Gurfinkel
,
Jeff Havrilla
,
Chuck Hines
,
John J. Hudak
,
Carly L. Huth
,
Wesley Jin
,
Rick Kazman
,
Mary Ann Lapham
,
James McCurley
,
John McGregor
,
David McIntire
,
Robert Nord
,
Ipek Ozkaya
,
Brittany Phillips
,
Robert W. Stoddard
,
David Zubrow
More from William Claycomb
Enabling and Measuring Early Detection of Insider Threats
December 10, 2012
•
Blog Post
By
William R. Claycomb
More from William Claycomb
Implementing Cyber Security in DoD Supply Chains
December 15, 2020
•
Video
By
William R. Claycomb
Panel Discussion: Managing the Insider Threat: What Every Organization Should Know
November 7, 2013
•
Webcast
By
Robert Floodeen
,
William R. Claycomb
,
Andrew P. Moore
,
Kurt C. Wallnau
,
Randall F. Trzeciak
,
Alex Nicoll
Emerging Trends
November 7, 2013
•
Webcast
By
William R. Claycomb
,
Andrew P. Moore
More from William Claycomb
Send a Message