-
3
-
-
27544447707
-
Towards a theory of insider threat assessment
-
Japan. IEEE Computer Society, Washington, D. C
-
Chinchani, R., A. Iyer, H. Q. Ngo, S. Upadhyaya. 2005. Towards a theory of insider threat assessment. The 2005 Internat. Conf. Dependable Systems and Networks (DSN'05), Yokohama, Japan. IEEE Computer Society, Washington, D. C. 108-117.
-
(2005)
The 2005 Internat. Conf. Dependable Systems and Networks (DSN'05), Yokohama
, pp. 108-117
-
-
Chinchani, R.1
Iyer, A.2
Ngo, H.Q.3
Upadhyaya, S.4
-
6
-
-
0035239243
-
An extreme-value model of concept testing
-
Dahan, E., H. Mendelson. 2001. An extreme-value model of concept testing. Management Sci. 47(1) 102-116.
-
(2001)
Management Sci
, vol.47
, Issue.1
, pp. 102-116
-
-
Dahan, E.1
Mendelson, H.2
-
7
-
-
0000617024
-
Models for exceedances over high thresholds (with discussion)
-
Davison, A. C., R. L. Smith. 1990. Models for exceedances over high thresholds (with discussion). J. Roy. Statist. Soc. 52 393-442.
-
(1990)
J. Roy. Statist. Soc
, vol.52
, pp. 393-442
-
-
Davison, A.C.1
Smith, R.L.2
-
8
-
-
77954534137
-
-
NBER Working Paper 11103, Cambridge, MA. Available at
-
de Fontnouvelle, P., J. Jordan, E. Rosengren. 2005. Implication of alternative operational risk modeling techniques. NBER Working Paper 11103, National Bureau of Economic Research. Cambridge, MA. Available at http://www. nber.org/papers/w11103.
-
(2005)
Implication of alternative operational risk modeling techniques
-
-
de Fontnouvelle, P.1
Jordan, J.2
Rosengren, E.3
-
9
-
-
18544363967
-
-
Prentice Hall, Upper Saddle River, NJ
-
Devaraj, S., R. Kohli. 2002. The IT Payoff. Prentice Hall, Upper Saddle River, NJ.
-
(2002)
The IT Payoff
-
-
Devaraj, S.1
Kohli, R.2
-
10
-
-
85036258669
-
Distribution of the estimators for autoregressive time series with a unit root
-
Dickey, D., W. Fuller. 1979. Distribution of the estimators for autoregressive time series with a unit root. J. Amer. Statist. Assoc. 74 427-431.
-
(1979)
J. Amer. Statist. Assoc
, vol.74
, pp. 427-431
-
-
Dickey, D.1
Fuller, W.2
-
11
-
-
0000472488
-
Likelihood ratio tests for autoregressive time series with a unit root
-
Dickey, D., W. Fuller. 1981. Likelihood ratio tests for autoregressive time series with a unit root. Econometrica 49 1057-1072.
-
(1981)
Econometrica
, vol.49
, pp. 1057-1072
-
-
Dickey, D.1
Fuller, W.2
-
13
-
-
85008765609
-
An overview of value at risk
-
Duffie, D., J. Pan. 1997. An overview of value at risk. J. Derivatives 4(3) 7-49.
-
(1997)
J. Derivatives
, vol.4
, Issue.3
, pp. 7-49
-
-
Duffie, D.1
Pan, J.2
-
14
-
-
0041685498
-
-
Working paper, The Wharton School, Philadelphia. Available at
-
Embrechts, P. 1996. Actuarial versus financial pricing of insurance. Working paper, The Wharton School, Philadelphia. Available at http://fic.wharton.upenn.edu/fic/papers/96/9617.pdf.
-
(1996)
Actuarial versus financial pricing of insurance
-
-
Embrechts, P.1
-
18
-
-
19544371722
-
A mana6gement perspective on risk of security threats to information systems
-
Farahmand, F., S. B. Navathe, G. P. Sharp, P. H. Enslow. 2005. A mana6gement perspective on risk of security threats to information systems. Inform. Tech. Management 6(2-3) 203-255.
-
(2005)
Inform. Tech. Management
, vol.6
, Issue.2-3
, pp. 203-255
-
-
Farahmand, F.1
Navathe, S.B.2
Sharp, G.P.3
Enslow, P.H.4
-
20
-
-
30344462995
-
The economic incentives for sharing security information
-
Gal-or, E., A. Ghose. 2005. The economic incentives for sharing security information. Inform. Systems Res. 16(2) 186-208.
-
(2005)
Inform. Systems Res
, vol.16
, Issue.2
, pp. 186-208
-
-
Gal-or, E.1
Ghose, A.2
-
21
-
-
3042720722
-
Information security: Why the future belongs to the quants
-
Geer, D., K. S. Hoo, A. Jaquith. 2003. Information security: Why the future belongs to the quants. IEEE Security & Privacy 1 32-40.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 32-40
-
-
Geer, D.1
Hoo, K.S.2
Jaquith, A.3
-
22
-
-
84990029315
-
The economics of information security investment
-
Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. Systems Secur. 5(4) 438-457.
-
(2002)
ACM Trans. Inform. Systems Secur
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
23
-
-
3242808612
-
-
Computer Security Institute, San Francisco
-
Gordon, L. A., M. P. Loeb, W. Lucyshyn, R. Richardson. 2005. 2005 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, San Francisco.
-
(2005)
2005 CSI/FBI Computer Crime and Security Survey
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
24
-
-
0004296209
-
-
Prentice Hall, Upper Saddle River, NJ
-
Greene, W. H. 2000. Econometric Analysis. Prentice Hall, Upper Saddle River, NJ.
-
(2000)
Econometric Analysis
-
-
Greene, W.H.1
-
26
-
-
84876594349
-
-
Papers No. 99-023/2, Tinbergen Institute Discussion Papers, Rotterdam, The Netherlands. Available at
-
Hallerbach, W., B. Menkveld. 1999. Value at risk as a diagnostic tool for corporates: The airline industry. Papers No. 99-023/2, Tinbergen Institute Discussion Papers, Rotterdam, The Netherlands. Available at http://www. tinbergen. nl/discussionpapers/99023.pdf.
-
(1999)
Value at risk as a diagnostic tool for corporates: The airline industry
-
-
Hallerbach, W.1
Menkveld, B.2
-
28
-
-
32644456297
-
-
Working paper, Center for International Security and Cooperation, Stanford University. Available at
-
Hoo, K. J. S. 2000. How much is enough? A risk-management approach to computer security. Working paper, Center for International Security and Cooperation, Stanford University. Available at http://iis-db.stanford.edu/pubs/ 11900/soohoo.pdf
-
(2000)
How much is enough? A risk-management approach to computer security
-
-
Hoo, K.J.S.1
-
29
-
-
0004038411
-
-
McGraw-Hill, New York
-
Jorion, P. 1997. Value at Risk. McGraw-Hill, New York.
-
(1997)
Value at Risk
-
-
Jorion, P.1
-
30
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
-
(2005)
Management Sci
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
32
-
-
61349123440
-
The 4th Internat. Meeting on Statist. Climatology
-
New Zealand Meteorological Service, Wellington, New Zealand
-
Leadbetter, M. R., I. Weissman, L. De Haan, H. Rootzen. 1989. On clustering of high levels in statistically stationary series. The 4th Internat. Meeting on Statist. Climatology, New Zealand Meteorological Service, Wellington, New Zealand.
-
(1989)
On clustering of high levels in statistically stationary series
-
-
Leadbetter, M.R.1
Weissman, I.2
De Haan, L.3
Rootzen, H.4
-
33
-
-
0034501202
-
Are we forgetting the risks of information technology?
-
Longstaff, T. A., C. Chittister, R. Pethia, Y. Y. Haimes. 2000. Are we forgetting the risks of information technology? IEEE Comput. 33(12) 43-51.
-
(2000)
IEEE Comput
, vol.33
, Issue.12
, pp. 43-51
-
-
Longstaff, T.A.1
Chittister, C.2
Pethia, R.3
Haimes, Y.Y.4
-
35
-
-
4243150787
-
Analyzing security costs
-
Mercuri, R. T. 2003. Analyzing security costs. Comm. ACM 46(6) 15-18.
-
(2003)
Comm. ACM
, vol.46
, Issue.6
, pp. 15-18
-
-
Mercuri, R.T.1
-
36
-
-
18844424363
-
Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management
-
Mitra, D., Q. Wang. 2005. Stochastic traffic engineering for demand uncertainty and risk-aware network revenue management. IEEE/ACM Trans. Networking 13(2) 221-233.
-
(2005)
IEEE/ACM Trans. Networking
, vol.13
, Issue.2
, pp. 221-233
-
-
Mitra, D.1
Wang, Q.2
-
37
-
-
0001075431
-
Statistical inference using extreme order statistics
-
Pickands, J. 1975, Statistical inference using extreme order statistics. Ann. Statist, 3 119-131.
-
(1975)
Ann. Statist
, vol.3
, pp. 119-131
-
-
Pickands, J.1
-
38
-
-
35248853499
-
How much security is enough to stop a thief? The economics of outsider theft via computer systems networks
-
Guadeloupe, French West Indies
-
Schecter, S. E., M. D. Smith. 2003. How much security is enough to stop a thief? The economics of outsider theft via computer systems networks, Proc. 7th Financial Cryptography Conf., Guadeloupe, French West Indies. 122-137.
-
(2003)
Proc. 7th Financial Cryptography Conf
, pp. 122-137
-
-
Schecter, S.E.1
Smith, M.D.2
-
39
-
-
84876596907
-
-
Shaw, E. D., K. G. Ruby, J. M. Post. 1998. The insider threat to information systems. Security Awareness Butt. 2-98.
-
Shaw, E. D., K. G. Ruby, J. M. Post. 1998. The insider threat to information systems. Security Awareness Butt. 2-98.
-
-
-
-
40
-
-
84972496066
-
Extreme value analysis of enviromental time series: An example based on ozone data (with discussion)
-
Smith, R. L. 1989. Extreme value analysis of enviromental time series: An example based on ozone data (with discussion). Statist. Sci. 4 367-393.
-
(1989)
Statist. Sci
, vol.4
, pp. 367-393
-
-
Smith, R.L.1
-
42
-
-
33748594201
-
An information systems security risk assessment model under Dcmpster-Shafer theory of belief functions
-
Sun, L., R. P. Srivastava, T. J. Mock. 2006. An information systems security risk assessment model under Dcmpster-Shafer theory of belief functions. J. Management Inform. Systems 22(3) 190-142.
-
(2006)
J. Management Inform. Systems
, vol.22
, Issue.3
, pp. 190-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
43
-
-
0024165315
-
-
Tawn, J. A. 1988. An extreme value theory model for dependent observations. J. Hydrology 101 227-250.
-
Tawn, J. A. 1988. An extreme value theory model for dependent observations. J. Hydrology 101 227-250.
-
-
-
-
44
-
-
33750482906
-
System reliability and free riding
-
L. J. Camp, S. Lewis, eds, Kluwer Academic Publishers, Boston/Dordrecht/London
-
Varian, H. R. 2004. System reliability and free riding. L. J. Camp, S. Lewis, eds. Economics of Information Security. Kluwer Academic Publishers, Boston/Dordrecht/London, 1-15.
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.R.1
|