-
2
-
-
0034823003
-
A trend analysis of exploitations
-
May
-
H. Browne, W. A. Arbaugh, J. McHugh, and W. L. Fithen. A trend analysis of exploitations. In Proc. 2001 IEEE Symposium on Security and Privacy, pages 214-229, May 2001.
-
(2001)
Proc. 2001 IEEE Symposium on Security and Privacy
, pp. 214-229
-
-
Browne, H.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
4
-
-
1642281565
-
Towards a game theory model of information warfare
-
Airforce Institute of Technology, Master's Thesis
-
D. Buike. Towards a game theory model of information warfare. Technical report, Airforce Institute of Technology, 1999. Master's Thesis.
-
(1999)
Technical Report
-
-
Buike, D.1
-
5
-
-
34250446073
-
Multipart pricing of public goods
-
E. H. Clarke. Multipart pricing of public goods. Public Choice, 11:17-33, 1971.
-
(1971)
Public Choice
, vol.11
, pp. 17-33
-
-
Clarke, E.H.1
-
6
-
-
0242550424
-
Complexity results about nash equilibria
-
Carnegie Mellon University, CMU-CS-02-135
-
V. Conitzer and T. Sandholm. Complexity results about nash equilibria. Technical report, Carnegie Mellon University, 2002. CMU-CS-02-135.
-
(2002)
Technical Report
-
-
Conitzer, V.1
Sandholm, T.2
-
11
-
-
0038223766
-
Using information security as a response to competitor analysis systems
-
L. A. Gordon and M. P. Loeb. Using information security as a response to competitor analysis systems. Communications of the ACM, 44(9):70-75, 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 70-75
-
-
Gordon, L.A.1
Loeb, M.P.2
-
12
-
-
0001314984
-
Incentives in teams
-
T. Groves. Incentives in teams. Econometrica, 41:617-663, 1973.
-
(1973)
Econometrica
, vol.41
, pp. 617-663
-
-
Groves, T.1
-
17
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi. A taxonomy of computer program security flaws. ACM Computing Surveys, 26(3), 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
18
-
-
0034513874
-
Intrusion confinement by isolation in information systems
-
P. Liu, S. Jajodia, and C.D. McCollum. Intrusion confinement by isolation in information systems. Journal of Computer Security, 8(4):243-279, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.4
, pp. 243-279
-
-
Liu, P.1
Jajodia, S.2
McCollum, C.D.3
-
19
-
-
0027609384
-
A survey of intrusion detection techniques
-
June
-
T.F. Lunt. A Survey of Intrusion Detection Techniques. Computers & Security, 12 (4):405-418, June 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
30
-
-
84980096808
-
Counterspeculation, auctions, and competitive sealed tenders
-
W. Vickrey. Counterspeculation, auctions, and competitive sealed tenders. Journal of Finance, 16:8-37, 1961.
-
(1961)
Journal of Finance
, vol.16
, pp. 8-37
-
-
Vickrey, W.1
-
34
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
February
-
J. Xu and W. Lee. Sustaining availability of web services under distributed denial of service attacks. In IEEE Transactions on Computer, 52(4):195-208, February 2003.
-
(2003)
IEEE Transactions on Computer
, vol.52
, Issue.4
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
|