-
4
-
-
34247529498
-
-
Doubleday
-
P. Senge, A. Kleiner, C. Roberts, R. Ross, B. Smith, The Fifth Discipline Fieldbook, Doubleday, 1994, pp. 113-189.
-
(1994)
The Fifth Discipline Fieldbook
, pp. 113-189
-
-
Senge, P.1
Kleiner, A.2
Roberts, C.3
Ross, R.4
Smith, B.5
-
5
-
-
34247479621
-
-
K. Marais and N. Leveson. Archetypes for Organizational Safety. Presented at IRIA03. [Online]. Available: http://sunnyday.mit.edu/papers/iria-marais.pdf
-
K. Marais and N. Leveson. Archetypes for Organizational Safety. Presented at IRIA03. [Online]. Available: http://sunnyday.mit.edu/papers/iria-marais.pdf
-
-
-
-
6
-
-
34247481439
-
Modeling and Simulation of the Escalation Archetype in Computer Security
-
presented at, Huntsville, AL, April
-
S. N. Rosenfeld, I. Rus, and M. Cukier, "Modeling and Simulation of the Escalation Archetype in Computer Security," presented at Symposium on Simulation Software Security (SSSS06), Huntsville, AL, April 2006.
-
(2006)
Symposium on Simulation Software Security (SSSS06)
-
-
Rosenfeld, S.N.1
Rus, I.2
Cukier, M.3
-
7
-
-
34247532854
-
-
Imagine That, Inc, v. 6.07, CD-ROM, Windows 98/ME/NT4/2K/XP, San Jose, CA
-
Imagine That, Inc. Extend. v. 6.07, [CD-ROM, Windows 98/ME/NT4/2K/XP]. San Jose, CA, 2005.
-
(2005)
Extend
-
-
-
8
-
-
0037338449
-
Towards the Definition and Use of a Core Set of Archetypal Structures in System Dynamics
-
Spring
-
E. F. Wolstenholme, "Towards the Definition and Use of a Core Set of Archetypal Structures in System Dynamics," System Dynamics Review, vol. 19, no. 1, Spring 2003, pp. 7-26.
-
(2003)
System Dynamics Review
, vol.19
, Issue.1
, pp. 7-26
-
-
Wolstenholme, E.F.1
-
10
-
-
34247543928
-
-
Feb. 27, Archetypes
-
W. Braun. (2002, Feb. 27). The Systems Archetypes. www.uni-klu.ac.at/ ~gossimit/pap/sd/wb_sysarch.pdf
-
(2002)
The Systems
-
-
Braun, W.1
-
11
-
-
84990029315
-
The Economics of Information Security Investment
-
November
-
L. A. Gordon and M. P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol. 5, no. 4, November 2002, pp. 438-457.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
12
-
-
13444274614
-
Evaluating Information Security Investments Using the Analytic Hierarchy Process
-
L. Bodin, L. Gordon, and M. P. Loeb, "Evaluating Information Security Investments Using the Analytic Hierarchy Process," Comm. of. the ACM, vol. 28, no. 2, pp. 79-83.
-
Comm. of. the ACM
, vol.28
, Issue.2
, pp. 79-83
-
-
Bodin, L.1
Gordon, L.2
Loeb, M.P.3
-
13
-
-
34247486555
-
Towards an Economic Analysis of Trusted Systems
-
presented at, Minneapolis, May 13-14
-
D. Bergemann, J. Feigenbaum, S. Shenker, and J. Smith, "Towards an Economic Analysis of Trusted Systems," presented at Third Annual Workshop on Economics and Information Security (WEIS '04). Minneapolis, May 13-14, 2004.
-
(2004)
Third Annual Workshop on Economics and Information Security (WEIS '04)
-
-
Bergemann, D.1
Feigenbaum, J.2
Shenker, S.3
Smith, J.4
-
14
-
-
34247513026
-
Department of Defense Trusted Computer System Evaluation Criteria" ("Orange Book"), DOD 5200.28-STD
-
U.S. Department of Defense Standard, Dec
-
U.S. Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation Criteria" ("Orange Book"), DOD 5200.28-STD, Library No. S225,7ll, Dec. 1985.
-
(1985)
Library
, Issue.S225
-
-
-
15
-
-
34247516484
-
-
ISO/IEC International Standards (IS) 15408-1:1999, 15408-2:1999, and 15408-3:1999, Common Criteria for Information Technology Security Evaluation: Parts 1-3, Version 2.1, August 1999 (CCIMB-99-031, CCIMB-99-032, and CCIMB-99-033). http://csrc.nist.gov/cc/ccv20/ccv21ist.htm
-
ISO/IEC International Standards (IS) 15408-1:1999, 15408-2:1999, and 15408-3:1999, "Common Criteria for Information Technology Security Evaluation": Parts 1-3, Version 2.1, August 1999 (CCIMB-99-031, CCIMB-99-032, and CCIMB-99-033). http://csrc.nist.gov/cc/ccv20/ccv21ist.htm
-
-
-
-
16
-
-
84888929255
-
Cyberciege: An Information Assurance Teaching Tool for Training and Awareness
-
presented at, North Bethesda, MD, March
-
C. E. Irvine et al, "Cyberciege: An Information Assurance Teaching Tool for Training and Awareness," presented at Fed. Info. Sys. Security Educators' Association Conference (FISSEA05), North Bethesda, MD, March 2005.
-
(2005)
Fed. Info. Sys. Security Educators' Association Conference (FISSEA05)
-
-
Irvine, C.E.1
-
17
-
-
0019608720
-
Formal Models for Computer Security
-
Sept
-
C. Landwehr, "Formal Models for Computer Security," Computer Surveys, vol. 13, no. 3, Sept. 1981
-
(1981)
Computer Surveys
, vol.13
, Issue.3
-
-
Landwehr, C.1
-
19
-
-
84964425047
-
Characterizing Intrusion Tolerant Systems Using A State Transition Model
-
F. Gong, K. Goseva-Popstojanova, F. Wang, R. Wang, K. Vaidyanathan, K. Trivedi, and B. Muthusamy, "Characterizing Intrusion Tolerant Systems Using A State Transition Model," in Proc. DARPA Information Survivability Conference and Exposition II. DISCEX'01, 2001.
-
(2001)
Proc. DARPA Information Survivability Conference and Exposition II. DISCEX'01
-
-
Gong, F.1
Goseva-Popstojanova, K.2
Wang, F.3
Wang, R.4
Vaidyanathan, K.5
Trivedi, K.6
Muthusamy, B.7
-
21
-
-
0033325475
-
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
-
Sept.-Oct
-
R. Ortalo, Y. Deswarte, and M. Kaaniche, "Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security," IEEE Transactions on Software Engineering, vol. 25, no. 5, pp. 633-650, Sept.-Oct. 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaaniche, M.3
-
22
-
-
16244368460
-
Model-Based Validation of an Intrusion-Tolerant Information System
-
Florianópolis, Brazil, October 18-20
-
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal, "Model-Based Validation of an Intrusion-Tolerant Information System," in Proc. of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Florianópolis, Brazil, October 18-20, 2004, pp. 184-194.
-
(2004)
Proc. of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004)
, pp. 184-194
-
-
Stevens, F.1
Courtney, T.2
Singh, S.3
Agbaria, A.4
Meyer, J.F.5
Sanders, W.H.6
Pal, P.7
-
23
-
-
27544493249
-
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack
-
Yokohama, Japan, June 28-July 1
-
S. Panjwani et al, "An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack," in Proc. International Conference on Dependable Systems and Networks (DSN05), Yokohama, Japan, June 28-July 1, 2005.
-
(2005)
Proc. International Conference on Dependable Systems and Networks (DSN05)
-
-
Panjwani, S.1
-
24
-
-
31944444819
-
A Developmental View of System Security
-
January
-
C. L. Huntley, "A Developmental View of System Security," Computer, vol. 39, no. 1, pp. 113-114, January 2006.
-
(2006)
Computer
, vol.39
, Issue.1
, pp. 113-114
-
-
Huntley, C.L.1
|