Follow
Samuel Perl
Samuel Perl
Carnegie Mellon University
Verified email at cert.org
Title
Cited by
Cited by
Year
Computer security incident response team development and evolution
R Ruefle, A Dorofee, D Mundie, AD Householder, M Murray, SJ Perl
IEEE Security & Privacy 12 (5), 16-26, 2014
972014
An Ontology for Insider Threat Indicators: Development and Application.
D Costa, M Collins, SJ Perl, M Albrethsen, G Silowash, D Spooner
STIDS, 48-53, 2014
572014
An insider threat indicator ontology
DL Costa, MJ Albrethsen, ML Collins, SJ Perl, GJ Silowash, DL Spooner
Technical Report CMU/SEI-2016-TR-007, 2016
522016
An Incident Management Ontology.
DA Mundie, R Ruefle, AJ Dorofee, SJ Perl, J McCloud, M Collins
STIDS, 62-71, 2014
232014
Toward an ontology for insider threat research: Varieties of insider threat definitions
DA Mundie, S Perl, CL Huth
2013 third workshop on socio-technical aspects in security and trust, 26-36, 2013
232013
Data mining for efficient collaborative information discovery
B Woods, SJ Perl, B Lindauer
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative …, 2015
182015
The critical role of positive incentives for reducing insider threats
AP Moore, SJ Perl, J Cowley, ML Collins, TM Cassidy, N VanHoudnos, ...
SEI Technical Report CMU/SEI-2016-TR-014, 2016
172016
Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior
A AlQadheeb, S Bhattacharyya, S Perl
Array 14, 100146, 2022
102022
Incident Management Capability Assessment
A Dorofee, R Ruefle, M Zajicek, D McIntire, C Alberts, S Perl, CL Huth, ...
CMU/SEI. URL: https://resources. sei. cmu. edu/asset_files/TechnicalReport …, 2018
82018
Insider threat indicator ontology (№ CMU/SEI-2016-TR-007)
DL Costa, MJ Albrethsen, ML Collins, SJ Perl, GJ Silowash, DL Spooner
Pittsburgh: Carnegie-Mellon University, 2016
72016
Insider Threat Defined: Discovering the Prototypical Case.
DA Mundie, SJ Perl, CH JD
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (2), 7-23, 2014
72014
A cognitive study of incident handling expertise
SJ Perl, RO Young
27th Annual FIRST Conference, Berlin, 2015
42015
Assurance for CyberSecurity with Assume-Guarantee Reasoning
A Alfageeh, S Bhattacharyya, S Perl, M Patel
2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019
12019
CONSIDERATIONS FOR EVALUATING LARGE LANGUAGE MODELS FOR CYBERSECURITY TASKS
J Gennari, S Lau, S Perl, J Parish, G Sastry
2024
DC3 DCISE Information Sharing Efforts
S Perl, SEI CERT
2022
Introduction to MISP
S Perl, SEI CERT
2021
Incident Management Capability Assessment Workbook
A Dorofee, R Ruefle, M Zajicek, D McIntire, C Alberts, S Perl, CL Huth, ...
2018
Silverfish-Red Team Exercise
N Mead, F Shull
2018
Information Discovery in Cybersecurity Incident Data Reported to DHS
S Perl, R Ruefle, ...
2017
Discovering patterns of activity in unstructured incident reports at scale
B Woods, S Perl
2015
The system can't perform the operation now. Try again later.
Articles 1–20