You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output.
Click here to find out more.
Mendeley readers
Chapter title |
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
|
---|---|
Chapter number | 14 |
Book title |
Computer Security – ESORICS 2005
|
Published by |
Springer, Berlin, Heidelberg, September 2005
|
DOI | 10.1007/11555827_14 |
Book ISBNs |
978-3-54-028963-0, 978-3-54-031981-8
|
Authors |
Indrajit Ray, Nayot Poolsapassit |
Mendeley readers
The data shown below were compiled from readership statistics for 79 Mendeley readers of this research output. Click here to see the associated Mendeley record.
Geographical breakdown
Country | Count | As % |
---|---|---|
United States | 2 | 3% |
Unknown | 77 | 97% |
Demographic breakdown
Readers by professional status | Count | As % |
---|---|---|
Student > Master | 19 | 24% |
Student > Ph. D. Student | 18 | 23% |
Researcher | 11 | 14% |
Student > Bachelor | 6 | 8% |
Student > Doctoral Student | 4 | 5% |
Other | 12 | 15% |
Unknown | 9 | 11% |
Readers by discipline | Count | As % |
---|---|---|
Computer Science | 61 | 77% |
Engineering | 4 | 5% |
Psychology | 2 | 3% |
Biochemistry, Genetics and Molecular Biology | 1 | 1% |
Physics and Astronomy | 1 | 1% |
Other | 1 | 1% |
Unknown | 9 | 11% |