-
1
-
-
33750440197
-
The economics of information security
-
Anderson, R., T. Moore. 2006. The economics of information security. Science 27(314) 610-613.
-
(2006)
Science
, vol.27
, Issue.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
2
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Arbaugh, W. A., W. L. Fithen, J. McHugh. 2000. Windows of vulnerability: A case study analysis. IEEE Comput. 33(12) 52-59.
-
(2000)
IEEE Comput
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
3
-
-
33644916146
-
Sell first, fix later: Impact of patching on software quality
-
Arora, A., J. P. Caulkins, R. Telang. 2006a. Sell first, fix later: Impact of patching on software quality. Management Sci. 52(3) 465-471.
-
(2006)
Management Sci
, vol.52
, Issue.3
, pp. 465-471
-
-
Arora, A.1
Caulkins, J.P.2
Telang, R.3
-
4
-
-
33846183559
-
Impact of patches and software vulnerability information on frequency of security attacks-An empirical analysis
-
Arora, A., A. Nandkumar, R. Telang. 2006b. Impact of patches and software vulnerability information on frequency of security attacks-An empirical analysis. Inform. Systems Frontier 8(5) 350-362.
-
(2006)
Inform. Systems Frontier
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
5
-
-
61849175198
-
Optimal policy for vulnerability disclosure
-
Arora, A., R. Telang, H. Xu. 2008. Optimal policy for vulnerability disclosure. Management Sci. 54(4) 642-656.
-
(2008)
Management Sci
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
6
-
-
33750703619
-
Network software security and user incentives
-
August, T., T. Tunca. 2006. Network software security and user incentives. Management Sci. 52(11) 1703-1720.
-
(2006)
Management Sci
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.2
-
7
-
-
0032050741
-
Software development practices, software complexities, and software maintenance
-
Banker, R., G. Davis, S. Slaughter. 1998. Software development practices, software complexities, and software maintenance. Management Sci. 44(4) 433-450.
-
(1998)
Management Sci
, vol.44
, Issue.4
, pp. 433-450
-
-
Banker, R.1
Davis, G.2
Slaughter, S.3
-
8
-
-
0029479221
-
Unemployment insurance and unemployment over time: An analysis with event history data
-
Belzil, C. 1995. Unemployment insurance and unemployment over time: An analysis with event history data. Rev. Econom. Statist. 77(1) 113-126.
-
(1995)
Rev. Econom. Statist.
, vol.77
, Issue.1
, pp. 113-126
-
-
Belzil, C.1
-
9
-
-
33746595082
-
Pricing security
-
Survivability Workshop, Boston
-
Camp, L., C. Wolfram. 2000. Pricing security. Proc. CERT Inform. Survivability Workshop, Boston, 31-39.
-
(2000)
Proc. CERT Inform.
, pp. 31-39
-
-
Camp, L.1
Wolfram, C.2
-
10
-
-
61349132536
-
How should we disclose software vulnerabilities?
-
Systems, Washington, D.C
-
Cavusoglu, H., H. Cavusoglu, S. Raghunathan. 2004. How should we disclose software vulnerabilities? Proc. 14th Annual Workshop Inform. Tech. Systems, Washington, D.C.
-
(2004)
Proc. 14th Annual Workshop Inform. Tech.
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
11
-
-
33750710835
-
Internet security, vulnerability disclosure, and software provision
-
Systems, Boston
-
Choi, J. P., C. Fershtman, N. Gandal. 2005. Internet security, vulnerability disclosure, and software provision. Proc. 4th Workshop Econom. Inform. Systems, Boston.
-
(2005)
Proc. 4th Workshop Econom. Inform.
-
-
Choi, J.P.1
Fershtman, C.2
Gandal, N.3
-
12
-
-
0016794660
-
Partial likelihood
-
(2, May/August)
-
Cox, D. R. 1975. Partial likelihood. Biometrika 62(2, May/August) 269-276.
-
(1975)
Biometrika
, vol.62
, pp. 269-276
-
-
Cox, D.R.1
-
13
-
-
0004296209
-
-
Macmillan Publishing Company, New York
-
Green, W. 1992. Econometric Analysis. Macmillan Publishing Company, New York.
-
(1992)
Econometric Analysis
-
-
Green, W.1
-
14
-
-
84876635784
-
-
Cisco details IOS vulnerability spilled at Black Hat, (July 29)
-
Information Week. 2005. Cisco details IOS vulnerability spilled at Black Hat. http://www.informationweek.com/story/showArticle.jhtml?articleID=166403842 (July 29).
-
(2005)
Information Week
-
-
-
16
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., R. Telang. 2005. Market for software vulnerabilities? Think again. Management Sci. 51(5) 726-740.
-
(2005)
Management Sci
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
33845382806
-
Nonparametric estimation from incomplete observations
-
Kaplan, E. L., P. Meier. 1958. Nonparametric estimation from incomplete observations. J. Amer. Statist. Assoc. 53 457-548.
-
(1958)
J. Amer. Statist. Assoc.
, vol.53
, pp. 457-548
-
-
Kaplan, E.L.1
Meier, P.2
-
18
-
-
0034205501
-
An empirical analysis of cost and conformance quality in software products
-
Krishnan, M. S., C. Kriebel, S. Kekre, T. Mukhopadhyay. 2000. An empirical analysis of cost and conformance quality in software products. Management Sci. 46 745-759.
-
(2000)
Management Sci
, vol.46
, pp. 745-759
-
-
Krishnan, M.S.1
Kriebel, C.2
Kekre, S.3
Mukhopadhyay, T.4
-
19
-
-
84876660363
-
-
National Vulnerability Database (NVD)
-
National Vulnerability Database (NVD). http://www.nvd.nist.gov/.
-
-
-
-
20
-
-
33846588487
-
To disclose or not? An analysis of software user behavior
-
Nizovtsev, D., M. Thursby. 2007. To disclose or not? An analysis of software user behavior. Inform. Econom. Policy 19(1) 43-64.
-
(2007)
Inform. Econom. Policy
, vol.19
, Issue.1
, pp. 43-64
-
-
Nizovtsev, D.1
Thursby, M.2
-
21
-
-
38149139761
-
Bug auctions: Vulnerability markets reconsidered
-
Minneapolis
-
Ozment, A. 2004. Bug auctions: Vulnerability markets reconsidered. 3rd Workshop Econom. Inform. Security, Minneapolis.
-
(2004)
3rd Workshop Econom. Inform. Security
-
-
Ozment, A.1
-
22
-
-
84876608221
-
-
Information security: User precaution and hacker targeting
-
Png, I., C. Tang, Q.-H. Wang. 2006. Information security: User precaution and hacker targeting. http://ssrn.com/abstract=912161.
-
(2006)
-
-
Png, I.1
Tang, C.2
Wang, Q.-H.3
-
23
-
-
84876625221
-
-
Symantec Inc. Symantec Internet Security Threat Report. Accessed June 24
-
Symantec Inc. Symantec Internet Security Threat Report. Accessed June 24, 2003, http://www.symantec.com.
-
(2003)
-
-
-
24
-
-
34547100991
-
Impact of vulnerability disclosure on market value of software vendors: An empirical analysis
-
Telang, R., S. Wattal. 2007. Impact of vulnerability disclosure on market value of software vendors: An empirical analysis. IEEE Trans. Software Engrg. 33(8) 544-557.
-
(2007)
IEEE Trans. Software Engrg.
, vol.33
, Issue.8
, pp. 544-557
-
-
Telang, R.1
Wattal, S.2
-
25
-
-
0018503089
-
The impact of heterogeneity in individual frailty on the dynamics of mortality
-
Vaupel, J. W., K. G. Manton, E. Stallard. 1979. The impact of heterogeneity in individual frailty on the dynamics of mortality. Demography 16 439-454.
-
(1979)
Demography
, vol.16
, pp. 439-454
-
-
Vaupel, J.W.1
Manton, K.G.2
Stallard, E.3
-
26
-
-
84876618821
-
-
Why open source software/free software (OSS/FS)? Look at the numbers! Accessed June 19, 2007
-
Wheeler, D. 2002. Why open source software/free software (OSS/FS)? Look at the numbers! Accessed June 19, 2007, https://wideopennews.com/archives/open-source-now-list/2002-May/pdf00000.pdf.
-
(2002)
-
-
Wheeler, D.1
|