-
1
-
-
4243137229
-
Cyber defense technology networking and evaluation
-
Bajcsy R., et al. Cyber defense technology networking and evaluation. Communications of the ACM 47 3 (2004) 58-61
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 58-61
-
-
Bajcsy, R.1
-
2
-
-
34547819843
-
-
Bergemann, D., et al., 2004. Towards an economic analysis of trusted systems. In: Presented at Third Annual Workshop on Economics and Information Security - WEIS04, Minneapolis.
-
-
-
-
3
-
-
34547765471
-
-
Bergemann, D., et al., 2005. Flexibility as an instrument in DRM systems. In: Presented at Fourth Annual Workshop on Economics and Information Security - WEIS05, Cambridge, Massachusetts.
-
-
-
-
4
-
-
13444274614
-
Evaluating information security investments using the analytic hierarchy process
-
Bodin L., et al. Evaluating information security investments using the analytic hierarchy process. Communications of the ACM 28 2 (2005) 79-83
-
(2005)
Communications of the ACM
, vol.28
, Issue.2
, pp. 79-83
-
-
Bodin, L.1
-
5
-
-
34547806204
-
-
Braun, W., 2002. The Systems Archetypes. .
-
-
-
-
6
-
-
0037599474
-
The economic cost of publicly announced information security breaches: empirical evidence from the stock market
-
Campbell K., et al. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11 (2003) 431-439
-
(2003)
Journal of Computer Security
, vol.11
, pp. 431-439
-
-
Campbell, K.1
-
7
-
-
34547740137
-
-
CERT (United States Computer Emergency Readiness Team), 2006. Technical Cyber Security Alerts. .
-
-
-
-
8
-
-
34547749508
-
-
Cohen, F., et al., 1999. Simulating CyberAttacks, Defenses, and Consequences. .
-
-
-
-
9
-
-
2642562805
-
-
Dacier, M., et al., 2004. Honeypots: practical means to validate malicious fault assumptions. In: Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing - PRDC04. IEEE, Papeete, Tahiti, French Polynesia, pp. 383-388.
-
-
-
-
10
-
-
33744943260
-
Subjective-cost policy routing
-
Proceedings of the Workshop on Internet and Network Economics, Springer, Berlin
-
Feigenbaum J., et al. Subjective-cost policy routing. Proceedings of the Workshop on Internet and Network Economics. Lecture Notes on Computer Science vol. 3828 (2005), Springer, Berlin 174-183
-
(2005)
Lecture Notes on Computer Science
, vol.3828
, pp. 174-183
-
-
Feigenbaum, J.1
-
11
-
-
0004278738
-
-
MIT Press and Wiley & Sons, Cambridge, Massachusetts
-
Forrester J. Industrial Dynamics (1961), MIT Press and Wiley & Sons, Cambridge, Massachusetts
-
(1961)
Industrial Dynamics
-
-
Forrester, J.1
-
12
-
-
34547759893
-
-
Gibson, S., 2002. The Strange Tale of the Denial of Service Attacks Against GRC.com. Gibson ResearchCorporation. .
-
-
-
-
13
-
-
84964425047
-
-
Gong, F., et al., 2001. Characterizing intrusion tolerant systems using a state transition model. In: Proceedings of DARPA Information Survivability Conference and Exposition II-DISCEX'01.
-
-
-
-
17
-
-
34547790355
-
-
Imagine That, Inc., 1998. Extend. (Version 4.1), [CD-ROM]. San Jose, CA.
-
-
-
-
18
-
-
20844440409
-
CyberCIEGE: gaming for information assurance
-
Irvine C.E., et al. CyberCIEGE: gaming for information assurance. IEEE Security and Privacy Magazine 3 3 (2005) 61-64
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.3
, pp. 61-64
-
-
Irvine, C.E.1
-
19
-
-
34547795816
-
-
ISO/IEC, 1999. International Standards (IS) 15408-1:1999, 15408-2:1999, and 15408-3:1999, "Common Criteria for Information Technology Security Evaluation": Part 1: "Introduction and General Model", Part 2: "Security Functional Requirements", and Part 3: "Security Assurance Requirements". Version 2.1.
-
-
-
-
20
-
-
34547812141
-
-
ISO/IEC 17799, 2005. Information technology - Security techniques - Code of practice for information security management.
-
-
-
-
21
-
-
0035001146
-
-
Jha, W., Wing, J.M., 2001. Survivability analysis of networked systems. In: Proceedings of the 23rd International Conference on Software Engineering - ICSE01, pp. 307-317.
-
-
-
-
22
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E., and Olovsson T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23 4 (1997) 235-245
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
23
-
-
0034427721
-
-
Krahl, D., 2000. The extend simulation environment. In: Proceedings of the 2000 Winter Simulation Conference, pp. 280-289.
-
-
-
-
25
-
-
0019608720
-
Formal models for computer security
-
Landwehr C. Formal models for computer security. Computer Surveys 13 3 (1981)
-
(1981)
Computer Surveys
, vol.13
, Issue.3
-
-
Landwehr, C.1
-
26
-
-
34547821522
-
-
Larose, R., Eastin, M.S., 2003. A social cognitive explanation of Internet uses and gratifications: toward a new theory of media attendance. In: Presented at International Communication Association, Communication and Technology Division, San Diego.
-
-
-
-
27
-
-
34547778528
-
-
Larose, R., Rifon, N., 2003. Your privacy is assured - of being invaded: Web sites with and without privacy seals. In: Presented at IADIS International Conference, Lisbon.
-
-
-
-
28
-
-
84964467431
-
-
Lowry, J., 2001. An initial foray into understanding adversary planning and courses of action. In: Proceedings DARPA Information Survivability Conference and Exposition II - DISCEX01, pp. 123-133.
-
-
-
-
29
-
-
34547749972
-
-
Marais, K., Leveson, N., 2003. Archetypes for organizational safety. In: Presented at IRIA03. .
-
-
-
-
30
-
-
34547760394
-
-
Naval Postgraduate School and Rivermind, Inc., 2006. Cyberciege (Version 1.5b). .
-
-
-
-
31
-
-
0033325475
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
Ortalo R., et al. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering 25 6 (1999) 633-650
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 633-650
-
-
Ortalo, R.1
-
32
-
-
27544493249
-
-
Panjwani, S., et al., 2005. An experimental evaluation to determine if port scans are precursors to an attack. In: 2005 International Conference on Dependable Systems and Networks - DSN05, Yokohama, Japan, pp. 602-611.
-
-
-
-
33
-
-
34547734544
-
-
Pouget, F., Dacier, M., 2004. Honeypot-based forensics. In: AusCERT Information Technology Security Conference 2004 - AusCERT04, Ashmore, Australia.
-
-
-
-
34
-
-
34547794234
-
-
Pouget, F., et al., 2004. Understanding threats: a prerequisite to enhance survivability of computing systems. In: International Infrastructure Survivability Workshop 2004 - IISW04, in Conjunction with 25th International Real-Time Systems Symposium - RTSS04, Lisbon.
-
-
-
-
35
-
-
34547800270
-
-
Pouget, F., et al., 2005. Leurre.com: on the advantages of deploying a large scale distributed honeypot platform. In: Proceedings E-Crime and Computer Conference 2005 - ECCE05, Monaco. .
-
-
-
-
36
-
-
34547745517
-
-
Rosenfeld, S.N., 2006. System Dynamics Modeling and Simulation of Enterprise Computer Security. Master's thesis, University of Maryland at College Park. .
-
-
-
-
37
-
-
34547799237
-
-
Rosenfeld, S.N., Rus., I., Cukier, M., 2006a. Modeling and simulation of the escalation archetype in computer security. In: Proceedings of 2006 Symposium on Simulation Software Security - SSSS06, Part of the 2006 Spring Simulation Multiconference (SpringSim06), Huntsville, Alabama. .
-
-
-
-
38
-
-
34247519266
-
-
Rosenfeld, S.N., Rus., I., Cukier, M., 2006b. Modeling the symptomatic fixes archetype in computer security. In: Proceedings of the 30th Annual International Computer Software and Applications Conference (COMPSAC'06), Chicago, pp. 178-188.
-
-
-
-
41
-
-
16244368460
-
-
Stevens, F., et al., 2004. Model-based validation of an intrusion-tolerant information system. In: Proceedings of the 23rd Symposium on Reliable Distributed Systems - SRDS04, Florianópolis, Brazil, pp. 184-194.
-
-
-
-
42
-
-
34547779011
-
-
US Department of Defense, 1985. Department of Defense Trusted Computer System Evaluation Criteria ("Orange Book"), DOD 5200.28-STD, Library No. S225,7ll. . CCIMB-99-031, CCIMB-99-032, and CCIMB-99-033. .
-
-
-
-
43
-
-
0037338449
-
Toward the definition and use of a core set of archetypal structures in system dynamics
-
Wolstenholme E. Toward the definition and use of a core set of archetypal structures in system dynamics. System Dynamics Review 19 1 (2003) 7-26
-
(2003)
System Dynamics Review
, vol.19
, Issue.1
, pp. 7-26
-
-
Wolstenholme, E.1
|