-
1
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
Lausanne, Switzerland
-
Aagedal J., Braber F., Dimitrakos T., Gran B.A., Raptis D., and Stolen K. Model-based risk assessment to improve enterprise security. Proceedings of the sixth international distributed object computing conference, September 17-20 (2002), Lausanne, Switzerland 51-62
-
(2002)
Proceedings of the sixth international distributed object computing conference, September 17-20
, pp. 51-62
-
-
Aagedal, J.1
Braber, F.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stolen, K.6
-
2
-
-
54949107497
-
-
Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003). Introduction to the OCTAVE approach. Retrieved, from 〈http://www.cert.org/octave/approach_intro.pdf〉.
-
Alberts, C., Dorofee, A., Stevens, J., & Woody, C. (2003). Introduction to the OCTAVE approach. Retrieved, from 〈http://www.cert.org/octave/approach_intro.pdf〉.
-
-
-
-
4
-
-
54949105179
-
-
Byres, E. & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems, In VDE Congress, Berlin, October 18-20, 213-218.
-
Byres, E. & Lowe, J. (2004). The myths and facts behind cyber security risks for industrial control systems, In VDE Congress, Berlin, October 18-20, 213-218.
-
-
-
-
5
-
-
0037599474
-
The economic cost of publicly announced information security breaches: empirical evidence from the stock market
-
Campbell K., Gordon L.A., Loeb M.P., and Zhou L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security 11 3 (2003) 431-448
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
6
-
-
54949137822
-
-
Campbell, P., & Stamp, J. (2004). A classification scheme for risk assessment methods. Sandia National Laboratory report SAND2004-4233, August.
-
Campbell, P., & Stamp, J. (2004). A classification scheme for risk assessment methods. Sandia National Laboratory report SAND2004-4233, August.
-
-
-
-
8
-
-
7444242205
-
The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers
-
Cavusoglu H., Mishra B., and Raghunathan S. The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce 9 1 (2004) 69-104
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-104
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
0033299558
-
Simulating cyber attacks, defenses, and consequences
-
Cohen F. Simulating cyber attacks, defenses, and consequences. Computers and Security 18 6 (1999) 479-518
-
(1999)
Computers and Security
, vol.18
, Issue.6
, pp. 479-518
-
-
Cohen, F.1
-
10
-
-
54949137075
-
-
Department of Homeland Security. (2006). National Infrastructure Protection Plan: Base Plan, revised draft V2. National Infrastructure Institute. 〈http://www.ni2ciel.org/NIPC/Revised-Draft-NIPP-v2.0.pdf〉. Accessed on January 5, 2007.
-
Department of Homeland Security. (2006). National Infrastructure Protection Plan: Base Plan, revised draft V2. National Infrastructure Institute. 〈http://www.ni2ciel.org/NIPC/Revised-Draft-NIPP-v2.0.pdf〉. Accessed on January 5, 2007.
-
-
-
-
12
-
-
84948651069
-
-
Ettredge, M., Richardson, V. J. (2002). Assessing the risk in e-commerce. In Proceedings of the 35th Hawaii international conference on system sciences, Big Island, HI, January 7-10, 194.
-
Ettredge, M., Richardson, V. J. (2002). Assessing the risk in e-commerce. In Proceedings of the 35th Hawaii international conference on system sciences, Big Island, HI, January 7-10, 194.
-
-
-
-
13
-
-
1142292428
-
Managing vulnerabilities of information systems to security incidents
-
Pennsylvania, Pittsburgh September 30-October 03
-
Farahmand F., Navathe S.B., Enslow P.H., and Sharp G.P. Managing vulnerabilities of information systems to security incidents. Proceedings of the fifth international conference on electronic commerce (2003), Pennsylvania, Pittsburgh 348-354 September 30-October 03
-
(2003)
Proceedings of the fifth international conference on electronic commerce
, pp. 348-354
-
-
Farahmand, F.1
Navathe, S.B.2
Enslow, P.H.3
Sharp, G.P.4
-
14
-
-
19544371722
-
A management perspective on risk of security threats to information systems
-
Farahmand F., Navathe S.B., Sharp G.P., and Enslow P.H. A management perspective on risk of security threats to information systems. Information Technology and Management 6 2-3 (2005) 203-225
-
(2005)
Information Technology and Management
, vol.6
, Issue.2-3
, pp. 203-225
-
-
Farahmand, F.1
Navathe, S.B.2
Sharp, G.P.3
Enslow, P.H.4
-
16
-
-
21244494118
-
A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems
-
Haimes Y.Y., and Chittester C.G. A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems. Journal of Homeland Security and Emergency Management 2 2 (2005) 1-21
-
(2005)
Journal of Homeland Security and Emergency Management
, vol.2
, Issue.2
, pp. 1-21
-
-
Haimes, Y.Y.1
Chittester, C.G.2
-
17
-
-
0036090498
-
Risk filtering, ranking, and management framework using hierarchical holographic modeling
-
Haimes Y.Y., Kaplan S., and Lambert J.H. Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis 22 2 (2002) 381-395
-
(2002)
Risk Analysis
, vol.22
, Issue.2
, pp. 381-395
-
-
Haimes, Y.Y.1
Kaplan, S.2
Lambert, J.H.3
-
19
-
-
15744399767
-
The impact of denial-of-service attack announcements on the market value of firms
-
Hovav A., and D'Arcy J. The impact of denial-of-service attack announcements on the market value of firms. Risk Management and Insurance Review 6 2 (2003) 97-121
-
(2003)
Risk Management and Insurance Review
, vol.6
, Issue.2
, pp. 97-121
-
-
Hovav, A.1
D'Arcy, J.2
-
20
-
-
85017361394
-
The impact of virus attack announcements on the market value of firms
-
Hovav A., and D'Arcy J. The impact of virus attack announcements on the market value of firms. Information Systems Security 13 3 (2004) 32-40
-
(2004)
Information Systems Security
, vol.13
, Issue.3
, pp. 32-40
-
-
Hovav, A.1
D'Arcy, J.2
-
21
-
-
0042267232
-
More effective risk assessment
-
Iheagwara C. More effective risk assessment. Computer Security Journal 19 2 (2003) 8-20
-
(2003)
Computer Security Journal
, vol.19
, Issue.2
, pp. 8-20
-
-
Iheagwara, C.1
-
22
-
-
0034501202
-
Are we forgetting the risk of information technology?
-
Longstaff T., Chittister C., Pethia R., and Haimes Y. Are we forgetting the risk of information technology?. IEEE Computer 33 12 (2000) 43-51
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 43-51
-
-
Longstaff, T.1
Chittister, C.2
Pethia, R.3
Haimes, Y.4
-
24
-
-
34548048602
-
Risk assessment: The first step
-
Miller D., and Byres E. Risk assessment: The first step. InTech 52 3 (2005) 68-69
-
(2005)
InTech
, vol.52
, Issue.3
, pp. 68-69
-
-
Miller, D.1
Byres, E.2
-
25
-
-
14844333141
-
Assessing the performance of interdependent infrastructures and optimizing investments
-
Nozick L.K., Turnquist M.A., Jones D.A., Davis J.R., and Lawton C.R. Assessing the performance of interdependent infrastructures and optimizing investments. International Journal of Critical Infrastructures 1 2-3 (2005) 144-154
-
(2005)
International Journal of Critical Infrastructures
, vol.1
, Issue.2-3
, pp. 144-154
-
-
Nozick, L.K.1
Turnquist, M.A.2
Jones, D.A.3
Davis, J.R.4
Lawton, C.R.5
-
26
-
-
54949088022
-
-
Patel, S. (2006). Secure internet-based communication protocol for SCADA networks. Ph.D. dissertation, University of Louisville, Louisville, Kentucky.
-
Patel, S. (2006). Secure internet-based communication protocol for SCADA networks. Ph.D. dissertation, University of Louisville, Louisville, Kentucky.
-
-
-
-
27
-
-
54949110336
-
Secure SCADA communications, monitoring, and control over the Internet
-
Honolulu, Hawaii November 9-11
-
Patel S., Graham J., Ralston P., and Tantalean R. Secure SCADA communications, monitoring, and control over the Internet. Proceedings of the 18th computer applications in industry and engineering (2005), Honolulu, Hawaii 169-174 November 9-11
-
(2005)
Proceedings of the 18th computer applications in industry and engineering
, pp. 169-174
-
-
Patel, S.1
Graham, J.2
Ralston, P.3
Tantalean, R.4
-
28
-
-
54949111847
-
-
University of Louisville, Louisville, Kentucky
-
Patel S., Tantalean R., Ralston P., and Graham J. Supervisory control and data acquisition remote terminal unit testbed. Intelligent Systems Research Laboratory technical report TR-ISRL-05-01, Department of Computer Engineering and Computer Science (2005), University of Louisville, Louisville, Kentucky
-
(2005)
Supervisory control and data acquisition remote terminal unit testbed. Intelligent Systems Research Laboratory technical report TR-ISRL-05-01, Department of Computer Engineering and Computer Science
-
-
Patel, S.1
Tantalean, R.2
Ralston, P.3
Graham, J.4
-
30
-
-
54949151233
-
-
Pumfrey, D. J. (1999). The principled design of computer system safety analyses. D. Phil. thesis, University of York, UK.
-
Pumfrey, D. J. (1999). The principled design of computer system safety analyses. D. Phil. thesis, University of York, UK.
-
-
-
-
31
-
-
54949099386
-
-
Rakaczky, E. (2005). Building a security business case. Process control systems forum, October 25-27, Chicago, Illinois, 〈www.pcsforum.org/events/2005/fall/pdf/Building%20a%20Security%20Business%20Case2a.pdf〉. Accessed on January 5, 2007.
-
Rakaczky, E. (2005). Building a security business case. Process control systems forum, October 25-27, Chicago, Illinois, 〈www.pcsforum.org/events/2005/fall/pdf/Building%20a%20Security%20Business%20Case2a.pdf〉. Accessed on January 5, 2007.
-
-
-
-
32
-
-
54949122292
-
-
University of Louisville, Louisville, KY
-
Ralston P.A., Graham J.H., and Patel S.C. Literature review of security and risk assessment of SCADA and DCS systems. Intelligent Systems Research Laboratory technical report TR-ISRL-06-01, Department of Computer Engineering and Computer Science (2006), University of Louisville, Louisville, KY
-
(2006)
Literature review of security and risk assessment of SCADA and DCS systems. Intelligent Systems Research Laboratory technical report TR-ISRL-06-01, Department of Computer Engineering and Computer Science
-
-
Ralston, P.A.1
Graham, J.H.2
Patel, S.C.3
-
33
-
-
12344298391
-
-
Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Hawaii international conference on system sciences, January 05-08, Big Island, HI, pp. 1-8.
-
Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Hawaii international conference on system sciences, January 05-08, Big Island, HI, pp. 1-8.
-
-
-
-
35
-
-
33748075456
-
Toward a unified security/safety model
-
Stoneburner G. Toward a unified security/safety model. Computer 39 8 (2006) 96-97
-
(2006)
Computer
, vol.39
, Issue.8
, pp. 96-97
-
-
Stoneburner, G.1
-
36
-
-
33747345465
-
-
University of Glamorgan, Pontypridd, Wales, UK
-
Vidalis S., and Jones A. Using vulnerability tress for decision making in threat assessment. School of Computing technical report CS-03-02 (2003), University of Glamorgan, Pontypridd, Wales, UK
-
(2003)
Using vulnerability tress for decision making in threat assessment. School of Computing technical report CS-03-02
-
-
Vidalis, S.1
Jones, A.2
-
38
-
-
84948954303
-
-
Yasinsac, A., Childs, J. (2001). Analyzing internet security protocols. In Proceedings of the sixth international conference on high assurance systems, Boca Raton, FL, October 2001, pp. 149-159.
-
Yasinsac, A., Childs, J. (2001). Analyzing internet security protocols. In Proceedings of the sixth international conference on high assurance systems, Boca Raton, FL, October 2001, pp. 149-159.
-
-
-
|