-
1
-
-
85005305538
-
The market for "lemons": Quality uncertainty and market mechanism
-
Akerlof, G.A. The market for "lemons": Quality uncertainty and market mechanism. Quarterly Journal of Economics, 84, 3 (1970), 488-500.
-
(1970)
Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
2
-
-
38149088764
-
Information security economics-and beyond
-
A. Menezes (ed.) Lecture Notes in Computer Science 4622. Berlin and Heidelberg: Springer
-
Anderson, R.J., and Moore, T. Information security economics-and beyond. In A. Menezes (ed.), Advances in Cryptology-CRYPTO 2007. Lecture Notes in Computer Science 4622. Berlin and Heidelberg: Springer, 2007, pp. 68-91.
-
(2007)
Advances in Cryptology-CRYPTO 2007
, pp. 68-91
-
-
Anderson, R.J.1
Moore, T.2
-
3
-
-
33750703619
-
Network software security and user incentives
-
August, T., and Tunca, T.I. Network software security and user incentives. Management Science, 52, 11 (2006), 1703-1720.
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
4
-
-
0004141256
-
Fundamental concepts of dependability
-
Laboratoire d'Analyse et d'Architecture des Systemes, Centre National de la Recherche Scientifique, Toulouse, France
-
Avizienis, A.; Laprie, J.; and Randell, B. Fundamental concepts of dependability. Technical Report no. 01145, Laboratoire d'Analyse et d'Architecture des Systemes, Centre National de la Recherche Scientifique, Toulouse, France, 2001.
-
(2001)
Technical Report No. 01145
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
-
5
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis, A.; Laprie, J.; Randell, B.; and Landwehr, C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1, 1 (2004), 11-33.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.2
Randell, B.3
Landwehr, C.4
-
6
-
-
77749261781
-
-
Verizon Business Risk Team, New York, available at
-
Baker, W.H.; Hylender, C.D.; and Valentine, J.A. 2008 data breach investigation report. Verizon Business Risk Team, New York, 2008 (available at www.verizonbusiness.com/resources/ security/databreachreport.pdf).
-
(2008)
Data Breach Investigation Report
, vol.2008
-
-
Baker, W.H.1
Hylender, C.D.2
Valentine, J.A.3
-
7
-
-
0000982594
-
The economic way of looking at behavior
-
Becker, G.S. The economic way of looking at behavior. Journal of Political Economy, 101, 3 (1993), 385-409.
-
(1993)
Journal of Political Economy
, vol.101
, Issue.3
, pp. 385-409
-
-
Becker, G.S.1
-
8
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
Bier, V.; Oliveros, S.; and Samuelson, L. Choosing what to protect: Strategic defensive allocation against an unknown attacker. Journal of Public Economic Theory, 9, 4 (2007), 563-587.
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
9
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., and Raghunathan, S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis, 1, 3 (2004), 131-148.
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
10
-
-
4243109556
-
A model for evaluating IT security investments
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. A model for evaluating IT security investments. Communications of the ACM, 47, 7 (2004), 87-92.
-
(2004)
Communications of the ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
11
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H.; Mishra, B.; and Raghunathan, S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16, 1 (2005), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
66549093519
-
Decision theoretic and game-theoretic approaches to IT security investment
-
Fall
-
Cavusoglu, H.; Raghunathan, S.; and Yue, W.T. Decision theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems, 25, 2 (Fall 2008), 281-304.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.T.3
-
13
-
-
84909999858
-
Understanding and influencing attackers' decisions: Implications for security investment strategies
-
Paper presented at the, Cambridge UK June, 26-28
-
Cremonini, M., and Nizovtsev, D. Understanding and influencing attackers' decisions: Implications for security investment strategies. Paper presented at the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June 26-28, 2006.
-
(2006)
Fifth Workshop on the Economics of Information Security (WEIS 2006)
-
-
Cremonini, M.1
Nizovtsev, D.2
-
14
-
-
84906628863
-
What do we know about the substitution effect in transnational terrorism?
-
A. Silke and G. Ilardi (eds.). Ilford, UK: Frank Cass
-
Enders, W., and Sandler, T. What do we know about the substitution effect in transnational terrorism? In A. Silke and G. Ilardi (eds.), Researching Terrorism Trends, Achievements, Failures. Ilford, UK: Frank Cass, 2004, pp. 119-137.
-
(2004)
Researching Terrorism Trends, Achievements, Failures
, pp. 119-137
-
-
Enders, W.1
Sandler, T.2
-
15
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of Internet miscreants
-
S. De Capitani, P. Syverson, and D. Evans (eds.). New York; AC M Press
-
Franklin, J.; Paxson, V.; Perrig, A.; and Savage, S. An inquiry into the nature and causes of the wealth of Internet miscreants. In S. De Capitani, P. Syverson, and D. Evans (eds.), Proceedings of the Fourteenth ACM Conference on Computer and Communications Security. New York; AC M Press, 2007, pp. 375-388.
-
(2007)
Proceedings of the Fourteenth ACM Conference on Computer and Communications Security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
16
-
-
84990029315
-
The economics of information security investment
-
Gordon, L.A., and Loeb, M.P. The economics of information security investment. ACM Transactions on Information and System Security, 5, 4 (2002), 438-457.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
18
-
-
33751256271
-
Income interdependence, and substitution effects affecting incentives for security investment
-
Hausken, K. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy, 25, 6 (2006), 629-665.
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
19
-
-
35348950536
-
Strategic defense and attack for series and parallel reliability systems
-
Hausken, K. Strategic defense and attack for series and parallel reliability systems. European Journal of Operational Research, 186, 2 (2008), 856-881.
-
(2008)
European Journal of Operational Research
, vol.186
, Issue.2
, pp. 856-881
-
-
Hausken, K.1
-
20
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson, E., and Olovsson, T. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 23, 4 (1997), 235-245.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
22
-
-
77749261847
-
Data breaches: What the underground world of "carding" reveals
-
U.S. Department of Justice, Washington DC, available at
-
Kiefer Peretti, K. Data breaches: What the underground world of "carding" reveals. Computer Crime and Intellectual Property Section, U.S. Department of Justice, Washington, DC, 2008 (available at www.usdoj.gov/criminal/cybercrime/DataBreachesArticle.pdf).
-
(2008)
Computer Crime and Intellectual Property Section
-
-
Kiefer Peretti, K.1
-
23
-
-
0037786763
-
Interdependent security
-
Kuhnreuther, H., and Heal, G. Interdependent security. Journal of Risk and Uncertainty, 26, 2-3 (2003), 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kuhnreuther, H.1
Heal, G.2
-
24
-
-
66549088878
-
The economics of computer hacking
-
Leeson, P.T., and Coyne, C.J. The economics of computer hacking. Journal of Law, Economics and Policy, 1, 2 (2006), 511-532.
-
(2006)
Journal of Law, Economics and Policy
, vol.1
, Issue.2
, pp. 511-532
-
-
Leeson, P.T.1
Coyne, C.J.2
-
25
-
-
84974774507
-
Towards operational measures of computer security
-
Littlewood, B.; Brocklehurst, S.; Fenton, N.; Mellor, P.; Page, S.; Wright, D.; Dobson, J.; McDermid, J.; and Gollmann, D. Towards operational measures of computer security. Journal of Computer Security, 2, 3 (1993), 211-229.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.3
, pp. 211-229
-
-
Littlewood, B.1
Brocklehurst, S.2
Fenton, N.3
Mellor, P.4
Page, S.5
Wright, D.6
Dobson, J.7
McDermid, J.8
Gollmann, D.9
-
26
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
Liu, P.; Zang, W.; and Yu, M. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security, 8, 1 (2005), 78-118.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
27
-
-
85070912494
-
Attack-potential-based survivability modeling for high-consequence systems
-
J. L. Cole and S.D. Wolthusen (eds.). Los Alamitos, CA : IEEE Computer Society
-
McDermott, J. Attack-potential-based survivability modeling for high-consequence systems. In J.L. Cole and S.D. Wolthusen (eds.), Proceedings of the Third IEEE International Information Assurance Workshop. Los Alamitos, CA : IEEE Computer Society, 2005, pp. 119-130.
-
(2005)
Proceedings of the Third IEEE International Information Assurance Workshop
, pp. 119-130
-
-
McDermott, J.1
-
28
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol, D.M.; Sanders, W.H.; and Trivedi, K.S. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 1, 1 (2004), 48-65.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
29
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P.; Cui, Y.; Reeves, D.S.; and Xu, D. Techniques and tools for analyzing intrusion alerts. ACM Transactions on Information and System Security, 7, 2 (2004), 274-318.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
30
-
-
0033325475
-
Experiments with quantitative evaluation tools for monitoring operational security
-
Ortalo, R.; Deswarte, Y.; and Kaâniche, M. Experiments with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 25, 5 (1999), 633-650.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.5
, pp. 633-650
-
-
Ortalo, R.1
Deswarte, Y.2
Kaâniche, M.3
-
31
-
-
63349088117
-
The deterrent and displacement effects of information security enforcement: International evidence
-
Fall
-
Png, I.P.L.; Wang, C.Y.; and Wang, Q.H. The deterrent and displacement effects of information security enforcement: International evidence. Journal of Management Information Systems, 25, 2 (Fall 2008), 125-144.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 125-144
-
-
Png, I.P.L.1
Wang, C.Y.2
Wang, Q.H.3
-
32
-
-
0001024816
-
A dynamic game of R&D: Patent protection and competitive behavior
-
Reinganum, J. A dynamic game of R&D: Patent protection and competitive behavior. Econometrica, 50, 3 (1982), 671-688.
-
(1982)
Econometrica
, vol.50
, Issue.3
, pp. 671-688
-
-
Reinganum, J.1
-
34
-
-
35248853499
-
How much security is enough to stop a thief? the economics of outsider theft via computer systems and networks
-
R.N. Wright (ed.). Lecture Notes in Computer Science 2742. Berlin: Springer
-
Schechter, S.E., and Smith, M.D. How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks. In R.N. Wright (ed.), Financial Cryptography Conference. Lecture Notes in Computer Science 2742. Berlin: Springer, 2003, pp. 122-137.
-
(2003)
Financial Cryptography Conference
, pp. 122-137
-
-
Schechter, S.E.1
Smith, M.D.2
-
35
-
-
33646075395
-
A model for when disclosure helps security: What is different about computer and network security?
-
Swire, P.P. A model for when disclosure helps security: What is different about computer and network security? Journal on Telecommunications and High Technology Law, 3, 1 (2004), 163-208.
-
(2004)
Journal on Telecommunications and High Technology Law
, vol.3
, Issue.1
, pp. 163-208
-
-
Swire, P.P.1
-
36
-
-
77749333197
-
A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government agencies
-
Swire, P.P. A theory of disclosure for security and competitive reasons: Open source, proprietary software, and government agencies. Houston Law Review, 42, 5 (2006), 1333-1380.
-
(2006)
Houston Law Review
, vol.42
, Issue.5
, pp. 1333-1380
-
-
Swire, P.P.1
-
37
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Valeur, F.; Vigna, G.; Kruegel, C.; and Kemmerer, R.A. A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing, 1, 3 (2004), 146-169.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
38
-
-
0033715016
-
Fixed- vs. variable-length patterns for detecting suspicious process behavior
-
Wespi, A.; Debar, H.; Dacier, M.; and Nassehi, M. Fixed- vs. variable-length patterns for detecting suspicious process behavior. Journal of Computer Security, 8, 2-3 (2000), 1-15.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2-3
, pp. 1-15
-
-
Wespi, A.1
Debar, H.2
Dacier, M.3
Nassehi, M.4
-
39
-
-
33847137650
-
Modeling network intrusion detection alerts for correlation
-
Zhou, J.; Heckman, M.; Reynolds, B.; Carlson, A.; and Bishop, M. Modeling network intrusion detection alerts for correlation. ACM Transactions on Information and System Security, 10, 1 (2007), 1-31.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.1
, pp. 1-31
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
|