-
1
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Arbaugh, W. A., W. L. Fithen, J. McHugh. 2000. Windows of vulnerability: A case study analysis. Computer 33(12) 52-59.
-
(2000)
Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
2
-
-
33644916146
-
Research note-sell first, fix later: Impact of patching on software quality
-
Arora, A., J. P. Caulkins, R. Telang. 2005. Research note-sell first, fix later: Impact of patching on software quality. Management Sci. 52(3) 465-471.
-
(2005)
Management Sci
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
3
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure?-An empirical analysis
-
Arora, A., A. Nandkumar, R. Telang. 2006a. Does information security attack frequency increase with vulnerability disclosure?-An empirical analysis. Inform. Systems Frontier 8 350-362.
-
(2006)
Inform. Systems Frontier
, vol.8
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
4
-
-
71249108731
-
Competitive and strategic effects in the timing of patch release
-
Cambridge, UK
-
Arora, A., C. Forman, A. Nandkumar, R. Telang. 2006b. Competitive and strategic effects in the timing of patch release. Fifth Workshop Econom. Inform. Security (WEIS 2006), Cambridge, UK.
-
(2006)
Fifth Workshop Econom. Inform. Security (WEIS 2006)
-
-
Arora, A.1
Forman, C.2
Nandkumar, A.3
Telang, R.4
-
6
-
-
33750703619
-
Network software security and user incentives
-
August, T., T. Tunca. 2005. Network software security and user incentives. Management Sci. 52(11) 1703-1720.
-
(2005)
Management Sci
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.2
-
7
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
USENIX Association, Berkeley, CA
-
Beattie, S., S. Arnold, C. Cowan, P. Wagle, C. Wright. 2002. Timing the application of security patches for optimal uptime. Proc. LISA: Sixteenth Systems Admin. Conf. , USENIX Association, Berkeley, CA, 233-242.
-
(2002)
Proc. LISA: Sixteenth Systems Admin. Conf
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
8
-
-
0034823003
-
A trend analysis of exploitations
-
IEEE Computer Society, Washington, D.C
-
Browne, H. K., W. A. Arbaugh, J. McHugh, W. L. Fithen. 2001. A trend analysis of exploitations. IEEE Sympos. Security Privacy, IEEE Computer Society, Washington, D.C., 214-229.
-
(2001)
IEEE Sympos. Security Privacy
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
10
-
-
33750689639
-
-
Working paper, Tulane University, New Orleans
-
Cavusoglu, H., H. Cavusoglu, J. Zhang. 2005. Security patch management: Share the burden or share the damage? Working paper, Tulane University, New Orleans.
-
(2005)
Security patch management: Share the burden or share the damage
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Zhang, J.3
-
12
-
-
84868906620
-
-
Accessed July 19, 2006
-
Clake, R. 2002. Black hat briefings USA. Accessed July 19, 2006, http://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html#RichardClarke.
-
(2002)
Black hat briefings USA
-
-
Clake, R.1
-
14
-
-
84990029315
-
The economics of information security investment
-
Gordon, L. A., M. P. Loeb. 2002. The economics of information security investment. ACM Trans. Inform. System Security 5(4) 438-457.
-
(2002)
ACM Trans. Inform. System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
15
-
-
61849101635
-
-
InfoWorld.com. 2003. Vulnerability enables passport account hijackings. http://www.infoworld.com/article/03/06/30/HNpass-1.html.
-
InfoWorld.com. 2003. Vulnerability enables passport account hijackings. http://www.infoworld.com/article/03/06/30/HNpass-1.html.
-
-
-
-
16
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
-
(2005)
Management Sci
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
84868898815
-
-
National Strategy to Secure Cyberspace, Accessed August 24, 2005
-
National Strategy to Secure Cyberspace. 2003. Accessed August 24, 2005, http://www.whitehouse.gov/pcipb.
-
(2003)
-
-
-
18
-
-
33846588487
-
To disclose or not? An analysis of software user behavior
-
Nizovtsev, D., M. Thursby. 2007. To disclose or not? An analysis of software user behavior. Inform. Econom. Policy 19(1) 43-64.
-
(2007)
Inform. Econom. Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.1
Thursby, M.2
-
20
-
-
14744268697
-
Computer security publications: Information economics, shifting liability and the first amendment
-
Preston, E., J. Lofton. 2002. Computer security publications: Information economics, shifting liability and the first amendment. Whittier Law Rev. 24 71-142.
-
(2002)
Whittier Law Rev
, vol.24
, pp. 71-142
-
-
Preston, E.1
Lofton, J.2
-
21
-
-
84962435308
-
Security holes ⋯ who cares?
-
Washington, D.C
-
Rescorla, E. 2003. Security holes ⋯ who cares? Proc. 12th USENIX Security Conf., Washington, D.C., 75-90.
-
(2003)
Proc. 12th USENIX Security Conf
, pp. 75-90
-
-
Rescorla, E.1
|