-
1
-
-
0034501202
-
Are we forgetting the risks of information technology
-
Longstaff TA, Chittister CG, Pethia R, Haimes YY. Are we forgetting the risks of information technology Computer, 2000 33 (12 43 51.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 43-51
-
-
Longstaff, T.A.1
Chittister, C.G.2
Pethia, R.3
Haimes, Y.Y.4
-
2
-
-
0025914419
-
Total risk management
-
Haimes YY. Total risk management. Risk Analysis, 1991 11 : 169 171.
-
(1991)
Risk Analysis
, vol.11
, pp. 169-171
-
-
Haimes, Y.Y.1
-
3
-
-
84988504967
-
A graph-based system for network-vulnerability analysis
-
Association for Computing Machinery
-
Phillips C, Swiler LP. A graph-based system for network-vulnerability analysis. In ACM Workshop on New Security Paradigms. Association for Computing Machinery, 1998.
-
(1998)
In ACM Workshop on New Security Paradigms.
-
-
Phillips, C.1
Swiler, L.P.2
-
5
-
-
33749647455
-
Time-to-compromise model for cyber risk reduction estimation
-
Springer
-
McQueen M, Boyer WF, Flynn MA, Beitel GA. Time-to-compromise model for cyber risk reduction estimation. In Proceedings of the 1st Quality of Protection Workshop at the University of Trento, Milan. Springer, 2005.
-
(2005)
In Proceedings of the 1st Quality of Protection Workshop at the University of Trento, Milan.
-
-
McQueen, M.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
7
-
-
0032311739
-
Reducing the vulnerability of water supply systems to attack
-
Haimes YY, Matalas NC, Lambert JH, Jackson BA, Fellows JFR. Reducing the vulnerability of water supply systems to attack. Journal of Infrastructure Systems, 1997 4 (4 164 177.
-
(1997)
Journal of Infrastructure Systems
, vol.4
, Issue.4
, pp. 164-177
-
-
Haimes, Y.Y.1
Matalas, N.C.2
Lambert, J.H.3
Jackson, B.A.4
Fellows, J.F.R.5
-
8
-
-
0036090498
-
Risk filtering, ranking, and management framework using hierarchical holographic modeling
-
Haimes YY, Kaplan S, Lambert JH. Risk filtering, ranking, and management framework using hierarchical holographic modeling. Risk Analysis, 2002 22 (2 383 398.
-
(2002)
Risk Analysis
, vol.22
, Issue.2
, pp. 383-398
-
-
Haimes, Y.Y.1
Kaplan, S.2
Lambert, J.H.3
-
12
-
-
9444250310
-
-
Version 1.1. National Aeronautics and Space Administration
-
Stamatelatos M, Vesely W, Dugan JB, Fragola J, Minarick J III., Railsback J. Fault Tree Handbook with Aerospace Applications. Version 1.1. National Aeronautics and Space Administration, 2002.
-
(2002)
Fault Tree Handbook with Aerospace Applications.
-
-
Stamatelatos, M.1
Vesely, W.2
Dugan, J.B.3
Fragola, J.4
Minarick Iii., J.5
Railsback, J.6
-
13
-
-
0021208648
-
A logarithmic poisson execution time model for software reliability measurement
-
Institute for Electrical and Electronics Engineers
-
Musa JD, Okumoto K. A logarithmic poisson execution time model for software reliability measurement. In IEEE International Conference on Software Engineering. Institute for Electrical and Electronics Engineers, 1984.
-
(1984)
In IEEE International Conference on Software Engineering.
-
-
Musa, J.D.1
Okumoto, K.2
-
14
-
-
0025135323
-
Application of software reliability modeling to product quality and test process
-
Institute for Electrical and Electronics Engineers
-
Ehrlich WK, Stampfel JP, Wu JR. Application of software reliability modeling to product quality and test process. In IEEE International Conference on Software Engineering. Institute for Electrical and Electronics Engineers, 1990.
-
(1990)
In IEEE International Conference on Software Engineering.
-
-
Ehrlich, W.K.1
Stampfel, J.P.2
Wu, J.R.3
-
20
-
-
0019540987
-
On the quantitative definition of risk
-
Kaplan S, Garrick BJ. On the quantitative definition of risk. Risk Analysis, 1981 1 : 11 27.
-
(1981)
Risk Analysis
, vol.1
, pp. 11-27
-
-
Kaplan, S.1
Garrick, B.J.2
-
22
-
-
13444304425
-
Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis
-
Haimes YY, Horowitz BM. Adaptive two-player hierarchical holographic modeling game for counterterrorism intelligence analysis. Journal of Homeland Security and Emergency Management, 2004 1 (3).
-
(2004)
Journal of Homeland Security and Emergency Management
, vol.1
, Issue.3
-
-
Haimes, Y.Y.1
Horowitz, B.M.2
-
24
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
Institute for Electrical and Electronics Engineers
-
Alpcan T, Basar T. A game theoretic approach to decision and analysis in network intrusion detection. In IEEE Conference on Decision and Control (CDC03). Institute for Electrical and Electronics Engineers, 2003.
-
(2003)
In IEEE Conference on Decision and Control (CDC03).
-
-
Alpcan, T.1
Basar, T.2
-
25
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
Institute for Electrical and Electronics Engineers
-
Alpcan T, Basar T. A game theoretic analysis of intrusion detection in access control systems. In IEEE Conference on Decision and Control (CDC04). Institute for Electrical and Electronics Engineers, 2004.
-
(2004)
In IEEE Conference on Decision and Control (CDC04).
-
-
Alpcan, T.1
Basar, T.2
-
30
-
-
0021371504
-
The partitioned multiobjective risk method
-
Asbeck E, Haimes YY. The partitioned multiobjective risk method. Large Scale Systems, 1984 6 (1 13 38.
-
(1984)
Large Scale Systems
, vol.6
, Issue.1
, pp. 13-38
-
-
Asbeck, E.1
Haimes, Y.Y.2
-
31
-
-
21244494118
-
A roadmap for quantifying the efficacy of risk management of information security and interdependent scada systems
-
Haimes YY, Chittister CG. A roadmap for quantifying the efficacy of risk management of information security and interdependent scada systems. Journal of Homeland Security and Emergency Management, 2005 2 (2).
-
(2005)
Journal of Homeland Security and Emergency Management
, vol.2
, Issue.2
-
-
Haimes, Y.Y.1
Chittister, C.G.2
-
32
-
-
0035281847
-
Leontief-based model for risk in complex interconnected infrastructures
-
Haimes YY, Jiang P. Leontief-based model for risk in complex interconnected infrastructures. ASCE Journal of Infrastructure Systems, 2001 7 (1 1 12.
-
(2001)
ASCE Journal of Infrastructure Systems
, vol.7
, Issue.1
, pp. 1-12
-
-
Haimes, Y.Y.1
Jiang, P.2
-
33
-
-
8844234423
-
Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures
-
Santos JR, Haimes YY. Modeling the demand reduction input-output inoperability due to terrorism of interconnected infrastructures. Risk Analysis, 2004 24 (6 1437 1451.
-
(2004)
Risk Analysis
, vol.24
, Issue.6
, pp. 1437-1451
-
-
Santos, J.R.1
Haimes, Y.Y.2
|