icon-carat-right
menu
search
cmu-wordmark
Carnegie Mellon University
Software Engineering Institute
Home
Publications
Authors
Todd Lewellen
Todd Lewellen
All
Tech Publications
Blog Posts
2016 Emerging Technology Domains Risk Survey
April 8, 2016
•
Technical Report
By
Christopher King
,
Dan J. Klinedinst
,
Todd Lewellen
,
Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
October 3, 2013
•
Technical Note
By
Todd Lewellen
,
George Silowash
,
Daniel L. Costa
Tempering the Vulnerability Hype Cycle with CVSS
August 8, 2013
•
Blog Post
By
Todd Lewellen
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
March 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
,
Joshua W. Burns
,
Daniel L. Costa
Common Sense Guide to Mitigating Insider Threats - Best Practice 11 (of 19)
January 25, 2013
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
More from Todd Lewellen
2016 Emerging Technology Domains Risk Survey
April 8, 2016
•
Technical Report
By
Christopher King
,
Dan J. Klinedinst
,
Todd Lewellen
,
Garret Wassermann
Insider Threat Control: Using Plagiarism Detection Algorithms to Prevent Data Exfiltration in Near Real Time
October 3, 2013
•
Technical Note
By
Todd Lewellen
,
George Silowash
,
Daniel L. Costa
Detecting and Preventing Data Exfiltration Through Encrypted Web Sessions via Traffic Inspection
March 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
,
Joshua W. Burns
,
Daniel L. Costa
Insider Threat Control: Using Universal Serial Bus (USB) Device Auditing to Detect Possible Data Exfiltration by Malicious Insiders
January 1, 2013
•
Technical Note
By
George Silowash
,
Todd Lewellen
Chronological Examination of Insider Threat Sabotage: Preliminary Observations
December 1, 2012
•
White Paper
By
William R. Claycomb
,
Carly L. Huth
,
Lori Flynn
,
David McIntire
,
Todd Lewellen
More from Todd Lewellen
Tempering the Vulnerability Hype Cycle with CVSS
August 8, 2013
•
Blog Post
By
Todd Lewellen
Common Sense Guide to Mitigating Insider Threats - Best Practice 11 (of 19)
January 25, 2013
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
"Spotlight On: Insider Threat from Trusted Business Partners" Article Revised and Released
November 2, 2012
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
Insider Threats Evident in All Industry Sectors
September 7, 2012
•
Blog Post
By
Todd Lewellen
,
CERT Insider Threat Center
More from Todd Lewellen