-
1
-
-
84925838576
-
Why information security is hard-an economic perspective
-
Washington, DC, USA, IEEE Computer Society
-
R. Anderson. Why information security is hard-an economic perspective. In ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference, page 358, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
ACSAC '01: Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 358
-
-
Anderson, R.1
-
3
-
-
33746689683
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Sept
-
J. Aspnes, K. Chang, and A. Yampolskiy. Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci., 72(6):1077-1093, Sept. 2006.
-
(2006)
J. Comput. Syst. Sci
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
5
-
-
65249157893
-
A New Perspective on Internet Security using Insurance
-
J. Bolot and M. Lelarge. A New Perspective on Internet Security using Insurance. In IEEE INFOCOM, pages 1948-1956, 2008.
-
(2008)
IEEE INFOCOM
, pp. 1948-1956
-
-
Bolot, J.1
Lelarge, M.2
-
8
-
-
0003651828
-
Critical mass and network size with application to the us fax market
-
Stern School of Business, Department of Economics, Aug
-
N. Economides and C. Himmelberg. Critical mass and network size with application to the us fax market. Working Papers 95-11, New York University, Leonard N. Stern School of Business, Department of Economics, Aug. 1995.
-
(1995)
Working Papers 95-11, New York University, Leonard N
-
-
Economides, N.1
Himmelberg, C.2
-
11
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
L. A. Gordon, M. P. Loeb, and W. Lucyshyn. Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy, 22(6):461-485, 2003.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
12
-
-
67249133467
-
Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents
-
J. Grossklags, N. Christin, and J. Chuang. Security investment (failures) in five economic environments: A comparison of homogeneous and heterogeneous user agents. WEIS, 2008.
-
(2008)
WEIS
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
13
-
-
65249113754
-
Efficiency of selfish investments in network security
-
L. Jiang, V. Anantharam, and J. C. Walrand. Efficiency of selfish investments in network security. In NetEcon, pages 31-36, 2008.
-
(2008)
NetEcon
, pp. 31-36
-
-
Jiang, L.1
Anantharam, V.2
Walrand, J.C.3
-
14
-
-
85020616309
-
Network externalities, competition, and compatibility
-
June
-
M. L. Katz and C. Shapiro. Network externalities, competition, and compatibility. American Economic Review, 75(3):424-40, June 1985.
-
(1985)
American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.L.1
Shapiro, C.2
-
16
-
-
58849096030
-
Diffusion and cascading behavior in random networks
-
Technical report
-
M. Lelarge. Diffusion and cascading behavior in random networks. Technical report, 2009.
-
(2009)
-
-
Lelarge, M.1
-
18
-
-
65249114132
-
A local mean field analysis of security investments in networks
-
New York, NY, USA, ACM
-
M. Lelarge and J. Bolot. A local mean field analysis of security investments in networks. In NetEcon '08: Proceedings of the 3rd international workshop on Economics of networked systems, pages 25-30, New York, NY, USA, 2008. ACM.
-
(2008)
NetEcon '08: Proceedings of the 3rd international workshop on Economics of networked systems
, pp. 25-30
-
-
Lelarge, M.1
Bolot, J.2
-
19
-
-
57349135233
-
Network externalities and the deployment of security features and protocols in the internet
-
New York, NY, USA, ACM
-
M. Lelarge and J. Bolot. Network externalities and the deployment of security features and protocols in the internet. In SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 37-48, New York, NY, USA, 2008. ACM.
-
(2008)
SIGMETRICS '08: Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
, pp. 37-48
-
-
Lelarge, M.1
Bolot, J.2
-
20
-
-
70349686853
-
Economic Incentives to Increase Security in the Internet: The Case for Insurance
-
M. Lelarge and J. Bolot. Economic Incentives to Increase Security in the Internet: The Case for Insurance. In IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Lelarge, M.1
Bolot, J.2
-
21
-
-
51749097143
-
Security decision-making among interdependent organizations
-
Washington, DC, USA, IEEE Computer Society
-
R. A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos. Security decision-making among interdependent organizations. In CSF '08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium, pages 66-80, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
CSF '08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
, pp. 66-80
-
-
Miura-Ko, R.A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
22
-
-
67650416963
-
Protecting against network infections: A game theoretic perspective
-
J. Omic, A. Orda, and P. Van Mieghem. Protecting against network infections: A game theoretic perspective. In IEEE INFOCOM, 2009.
-
(2009)
IEEE INFOCOM
-
-
Omic, J.1
Orda, A.2
Van Mieghem, P.3
-
23
-
-
75749141441
-
Economics of malware: Security decisions, incentives and externalities
-
May
-
M. J. van Eeten and J. M. Bauer. Economics of malware: Security decisions, incentives and externalities. OECD Science, Technology and Industry Working Papers 2008/1, OECD Directorate for Science, Technology and Industry, May 2008.
-
(2008)
OECD Science, Technology and Industry Working Papers 2008/1, OECD Directorate for Science, Technology and Industry
-
-
van Eeten, M.J.1
Bauer, J.M.2
-
24
-
-
77949631443
-
-
H. R. Varian. System reliability and free riding. In in Economics of Information Security, Kluwer 2004 pp 115, pages 1-15. Kluwer Academic Publishers, 2002.
-
H. R. Varian. System reliability and free riding. In in Economics of Information Security, Kluwer 2004 pp 115, pages 1-15. Kluwer Academic Publishers, 2002.
-
-
-
-
25
-
-
12244311689
-
A taxonomy of computer worms
-
ACM New York, NY, USA
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In Proceedings of the 2003 ACM workshop on Rapid Malcode, pages 11-18. ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 2003 ACM workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
26
-
-
16344396406
-
Monitoring and early warning for internet worms
-
ACM New York, NY, USA
-
C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and early warning for internet worms. In Proceedings of the 10th ACM conference on Computer and communications security, pages 190-199. ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 10th ACM conference on Computer and communications security
, pp. 190-199
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
|