-
1
-
-
67649666107
-
A Framework for 1. Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making
-
R. Rue, S.L. Pfleeger, and D. Ortiz, "A Framework for 1. Classifying and Comparing Models of Cyber Security Investment to Support Policy and Decision-Making," Proc. WEIS 2007, 2007; http://weis2007.econinfosec. org/papers/76.pdf.
-
(2007)
Proc. WEIS 2007
-
-
Rue, R.1
Pfleeger, S.L.2
Ortiz, D.3
-
2
-
-
39449096290
-
Cybersecurity Economic 2. Issues: Clearing the Path to Good Practice
-
S.L. Pfleeger and R. Rue, "Cybersecurity Economic 2. Issues: Clearing the Path to Good Practice," IEEE Software, vol.25, no.1, 2008, pp. 35-42.
-
(2008)
IEEE Software
, vol.25
, Issue.1
, pp. 35-42
-
-
Pfleeger, S.L.1
Rue, R.2
-
3
-
-
84944232084
-
3.Interdependence of Reliability and Security
-
P. Honeyman, G.A. Schwartz, and A. Van Assche, 3. "Interdependence of Reliability and Security," Proc. WEIS 2007, 2007; http://weis2007. econinfosec.org/ papers/71.pdf.
-
(2007)
Proc. WEIS 2007
-
-
Honeyman, P.1
Schwartz, G.A.2
Van Assche, A.3
-
4
-
-
67649673142
-
Opti- 4. mally Securing Interconnected Information Systems and Assets
-
V. Kumar, R. Telang and T. Mukhopadhyay, "Opti- 4. mally Securing Interconnected Information Systems and Assets," Proc. WEIS 2007, 2007; http://weis2007. econinfosec.org/papers/64.pdf.
-
(2007)
Proc. WEIS 2007
-
-
Kumar, V.1
Telang, R.2
Mukhopadhyay, T.3
-
5
-
-
34248574143
-
Asymmetric Conflict: 5. Weakest Link against Best Shot
-
D.J. Clark and K.A. Konrad, "Asymmetric Conflict: 5. Weakest Link against Best Shot," J. Conflict Resolution, vol.51, no.3, 2007, pp. 457-468; http://jcr.sagepub. com/cgi/content/abstract/51/3/457.
-
(2007)
J. Conflict Resolution
, vol.51
, Issue.3
, pp. 457-468
-
-
Clark, D.J.1
Konrad, K.A.2
-
6
-
-
4243109556
-
A 6. Model for Evaluating IT Security Investments
-
H. Cavusoglu, B. Mishra, and S. Raghunathan, "A 6. Model for Evaluating IT Security Investments," Comm. ACM, vol.47, no.7, 2004; http://info.freeman.tulane. edu/huseyin/paper/investment.pdf.
-
(2004)
Comm. ACM
, vol.47
, Issue.7
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
7
-
-
70350361678
-
An Insurance-Style Model for Deter- 7. mining the Appropriate Investment Level against Maximum Loss Arising from an Information Security Breach
-
R. Adkins, "An Insurance-Style Model for Deter- 7. mining the Appropriate Investment Level against Maximum Loss Arising from an Information Security Breach," Proc. WEIS 2004, 2004; www.dtc.umn.edu/ weis2004/adkins.pdf.
-
(2004)
Proc. WEIS 2004
-
-
Adkins, R.1
-
8
-
-
12344266250
-
-
Cambridge Univ. Computer Lab
-
R. Brady, R. Anderson, and R.C. Ball, 8. Murphy's Law, the Fitness of Evolving Species, and the Limits of Software Reliability, tech. report 471, Cambridge Univ. Computer Lab., 1999; www.cl.cam.ac.uk/techreports/UCAMCL- TR-471.pdf .
-
(1999)
Murphy's Law, the Fitness of Evolving Species, and the Limits of Software Reliability, Tech. Report 471
, vol.8
-
-
Brady, R.1
Anderson, R.2
Ball, R.C.3
-
10
-
-
67650197986
-
Improving Vulnerability Discovery Mod- 10. els
-
ACM Press
-
A. Ozment, "Improving Vulnerability Discovery Mod- 10. els," Proc. 2007 ACM Workshop on Quality of Protection, ACM Press, 2007, pp. 6-11; http://portal.acm.org/ citation.cfm?id=1314257.1314261.
-
Proc. 2007 ACM Workshop on Quality of Protection
, vol.2007
, pp. 6-11
-
-
Ozment, A.1
-
13
-
-
84869608955
-
-
RAND Corp., 2004; www.rand.org/pubs/monograph-reports/MR1601/.
-
(2004)
-
-
|