-
1
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis et al., "Basic Concepts and Taxonomy of Dependable and Secure Computing," IEEE Trans. Dependable and Secure Computing, vol.1, no.1, 2004, pp. 11-33.
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
-
2
-
-
67649659865
-
Useful cybersecurity metrics
-
July/Aug.
-
S.L. Pfleeger, "Useful Cybersecurity Metrics," IT Professional, July/Aug. 2009, pp. 38-45.
-
(2009)
IT Professional
, pp. 38-45
-
-
Pfleeger, S.L.1
-
4
-
-
0019058442
-
Programs, life cycles, and laws of software evolution
-
M.M. Lehman, "Programs, Life Cycles, and Laws of Software Evolution," Proc. IEEE, vol.68, no.9, 1980, pp. 1060-1076.
-
(1980)
Proc. IEEE
, vol.68
, Issue.9
, pp. 1060-1076
-
-
Lehman, M.M.1
-
5
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
IEEE CS Press
-
R.P. Lippmann et al., "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. 2000 DARPA Information Survivability Conf. and Exposition (DISCEX 00), IEEE CS Press, vol.2, pp. 12-26.
-
Proc. 2000 DARPA Information Survivability Conf. and Exposition (DISCEX 00)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
-
6
-
-
0003231551
-
Why things bite back: Technology and the revenge of unintended consequences
-
E. Tenner, Why Things Bite Back: Technology and the Revenge of Unintended Consequences, Vintage Books, 1996.
-
(1996)
Vintage Books
-
-
Tenner, E.1
-
7
-
-
77955160706
-
Trust and risk in the workplace
-
M. Whitty, Trust and Risk in the Workplace, SurfControl, 2007.
-
(2007)
SurfControl
-
-
Whitty, M.1
-
8
-
-
77955132145
-
Practical principles for computer security
-
NATO Science Series, IOS Press
-
B. Lampson, "Practical Principles for Computer Security," Software System Reliability and Security: Proc. 2006 Marktoberdorf Summer School, NATO Science Series, IOS Press, 2006; http://research.microsoft.com/en- us/um/ people/blampson/74-PracticalPrinciplesSecurity/74- PracticalPrinciplesSecurity.pdf.
-
(2006)
Software System Reliability and Security: Proc. 2006 Marktoberdorf Summer School
-
-
Lampson, B.1
-
10
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Ad vances in Cryptology-Crypto '96, Springer
-
P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Ad vances in Cryptology-Crypto '96, LNCS 1109, Springer, 1996, pp. 104-113; www.cryptography.com/public/pdf/ TimingAttacks.pdf.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.1
-
11
-
-
33846166742
-
The potential for underinvestment in internet security: Implications for regulatory policy
-
A. Garcia and B. Horowitz, "The Potential for Underinvestment in Internet Security: Implications for Regulatory Policy," J. Regulatory Economics, vol.31, no.1, 2007, pp. 37-51; http://ssrn.com/abstract=889071.
-
(2007)
J. Regulatory Economics
, vol.31
, Issue.1
, pp. 37-51
-
-
Garcia, A.1
Horowitz, B.2
-
12
-
-
0000420316
-
Economics in the laboratory
-
V. Smith, "Economics in the Laboratory," J. Economic Perspectives, vol.8, no.1, 1994, pp. 113-131.
-
(1994)
J. Economic Perspectives
, vol.8
, Issue.1
, pp. 113-131
-
-
Smith, V.1
-
13
-
-
77955127926
-
Application of collaborative risk analysis to cyber security investment decisions
-
B. Horowitz and J. Crawford, "Application of Collaborative Risk Analysis to Cyber Security Investment Decisions," Financial Services Technology Consortium Innovation J., vol.2, no.1, 2007, pp. 2-5.
-
(2007)
Financial Services Technology Consortium Innovation J.
, vol.2
, Issue.1
, pp. 2-5
-
-
Horowitz, B.1
Crawford, J.2
-
14
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
D. Kahneman and A. Tversky, "Prospect Theory: An Analysis of Decision under Risk," Econometrica, vol.47, no.2, 1979, pp. 263-291.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
15
-
-
77955158885
-
So you can't pick the hits?
-
Washington Post, 4 Jan.
-
D. Watts, "So You Can't Pick the Hits? Neither Can Anyone Else," Washington Post, 4 Jan. 2009, p. B04.
-
(2009)
Neither Can Anyone Else
-
-
Watts, D.1
-
16
-
-
33750093555
-
Measuring relative attack surfaces
-
D.T. Lee et al., eds., Springer
-
M. Howard, J. Pincus, and J. Wing, "Measuring Relative Attack Surfaces," Computer Security in the 21st Century, D.T. Lee et al., eds., Springer, 2005, pp. 109-137.
-
(2005)
Computer Security in the 21st Century
, pp. 109-137
-
-
Howard, M.1
Pincus, J.2
Wing, J.3
-
17
-
-
84877999984
-
Milk or wine: Does software security improve with age?
-
Usenix
-
A. Ozment and S. Schechter, "Milk or Wine: Does Software Security Improve with Age?" Proc. 15th Usenix Security Symp., Usenix, 2006, pp. 93-104.
-
(2006)
Proc. 15th Usenix Security Symp.
, pp. 93-104
-
-
Ozment, A.1
Schechter, S.2
|