-
2
-
-
57649097311
-
Information security management: "A human challenge?"
-
doi: 10.1016/j.istr.2008.10.006
-
Ashenden, D. Information Security Management: "A Human Challenge?" Information Security Technical Report (2008), doi: 10.1016/j.istr.2008.10.006.
-
(2008)
Information Security Technical Report
-
-
Ashenden, D.1
-
3
-
-
77957909604
-
Modelling the human and technological costs and benefits of USB memory stick security
-
M. Eric Johnson (editor) Springer
-
Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., Sasse, A., Wonham, M.: Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. In: Managing Information Risk and the Economics of Security, M. Eric Johnson (editor), 141-163. Springer, 2009.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 141-163
-
-
Beautement, A.1
Coles, R.2
Griffin, J.3
Ioannidis, C.4
Monahan, B.5
Pym, D.6
Sasse, A.7
Wonham, M.8
-
5
-
-
60649088249
-
Analysing the performance of security solutions to reduce vulnerability exposure windows
-
Anaheim, California: IEEE
-
Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D., Ventura, P.: Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Windows, Proc. Annual Computer Security Applications Conference, 33-42, Anaheim, California: IEEE, 2008.
-
(2008)
Proc. Annual Computer Security Applications Conference
, pp. 33-42
-
-
Beres, Y.1
Griffin, J.2
Shiu, S.3
Heitman, M.4
Markle, D.5
Ventura, P.6
-
6
-
-
84863947461
-
-
College Publications, London (forthcoming)
-
Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications, London, 2010 (forthcoming).
-
(2010)
A Discipline of Mathematical Systems Modelling
-
-
Collinson, M.1
Monahan, B.2
Pym, D.3
-
8
-
-
72649084291
-
A logical and computational theory of located resource
-
doi:10.1093/logcom/exp021
-
Collinson, M., Monahan, B., Pym, D.: A Logical and Computational Theory of Located Resource. Journal of Logic and Computation, 19(6): 1207-1244, 2009. doi:10.1093/logcom/exp021.
-
(2009)
Journal of Logic and Computation
, vol.19
, Issue.6
, pp. 1207-1244
-
-
Collinson, M.1
Monahan, B.2
Pym, D.3
-
9
-
-
74149091842
-
Algebra and logic for resource-based systems modelling
-
Collinson, M., Pym, D.: Algebra and logic for resource-based systems modelling. Math. Struct. Comp. Sci. 19:959-1027, 2009.
-
(2009)
Math. Struct. Comp. Sci.
, vol.19
, pp. 959-1027
-
-
Collinson, M.1
Pym, D.2
-
12
-
-
0020168283
-
Sources of bias in assessment procedures for utility functions
-
Hersey, J.C., Kunreuther, H.C., Shoemaker, P.J.: Sources of bias in assessment procedures for utility functions. Management Science 28, 936-953, 1982.
-
(1982)
Management Science
, vol.28
, pp. 936-953
-
-
Hersey, J.C.1
Kunreuther, H.C.2
Shoemaker, P.J.3
-
13
-
-
70350359511
-
Investments and trade-offs in the economics of information security
-
Dingledine, R. and Golle, P. (editors), LNCS 5628 Springer
-
Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. Proc. Financial Cryptography and Data Security, Dingledine, R. and Golle, P. (editors), LNCS 5628: 148 - 166, Springer, 2009.
-
(2009)
Proc. Financial Cryptography and Data Security
, pp. 148-166
-
-
Ioannidis, C.1
Pym, D.2
Williams, J.3
-
14
-
-
0024607197
-
Some experimental findings on decision-making under risk and their implications
-
Jaffrey, J.Y.: Some experimental findings on decision-making under risk and their implications. European Journal of Operational Research 38, 301-306, 1989.
-
(1989)
European Journal of Operational Research
, vol.38
, pp. 301-306
-
-
Jaffrey, J.Y.1
-
15
-
-
0037911569
-
A decision support system for multi-attribute utility evaluation based on imprecise assignments
-
Jimenéz, A., Ríos-Insua, S. Mateos, A.: A decision support system for multi-attribute utility evaluation based on imprecise assignments. Dec. Supp. Syst. 36, 65-79, 2003.
-
(2003)
Dec. Supp. Syst.
, vol.36
, pp. 65-79
-
-
Jimenéz, A.1
Ríos-Insua, S.2
Mateos, A.3
-
16
-
-
0031123773
-
Quantitative model of the security intrusion process based on attacker behaviour
-
Jonsson, E., Olovsson, A.: Quantitative Model of the Security Intrusion Process Based on Attacker Behaviour. IEEE Transactions on Software Engineering 23(4), 235 - 245, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, A.2
-
18
-
-
0003148796
-
Lottery equivalents: Reduction of the certainty effect problem in utility assessment
-
McCord, M., de Neufville, R.: Lottery equivalents: reduction of the certainty effect problem in utility assessment. Management Science 32, 56-61, 1986.
-
(1986)
Management Science
, vol.32
, pp. 56-61
-
-
McCord, M.1
De Neufville, R.2
-
20
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Nicol, D., Sanders, W., Rivedi, K.: Model-based evaluation: from dependability to security. IEEE Transactions on Dependable and Secure Computing 1(1), 48-65, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.1
Sanders, W.2
Rivedi, K.3
-
22
-
-
33644694176
-
Complementarity in systems modelling
-
(M. Pidd, editor), Wiley
-
Pidd, M.: Complementarity in systems modelling. In: Systems Modelling: Theory and Practice (M. Pidd, editor), Wiley, 2004.
-
(2004)
Systems Modelling: Theory and Practice
-
-
Pidd, M.1
-
24
-
-
77957927313
-
Where security reports reflects expanded role and responsibilities
-
Rasmussen M, Stamp P.: Where Security Reports Reflects Expanded Role And Responsibilities. Forrester 2005.
-
(2005)
Forrester
-
-
Rasmussen, M.1
Stamp, P.2
-
25
-
-
77957914736
-
Jericho forum looks to bring network walls tumbling down
-
8 July
-
Stamp, P.: Jericho Forum Looks To Bring Network Walls Tumbling Down. Forrester, 8 July, 2005.
-
(2005)
Forrester
-
-
Stamp, P.1
-
26
-
-
0001892893
-
A Bayesian approach to real estate management
-
S.E. Feinberg and A. Zellner, editors North Holland
-
Varian, H.: A bayesian approach to real estate management. In S.E. Feinberg and A. Zellner, editors, Studies in Bayesian Economics in Honour of L.J. Savage, 195-208, North Holland, 1974.
-
(1974)
Studies in Bayesian Economics in Honour of L.J. Savage
, pp. 195-208
-
-
Varian, H.1
-
27
-
-
77957929413
-
Predictive modelling for security operations economics
-
Presented at 23 - 24 October Washington DC. Available as HP Labs Technical Report HPL-2006-125
-
Yearworth, M., Monahan, B., Pym, D.: Predictive Modelling for Security Operations Economics. Presented at the Workshop on the Economics of Securing the Information Infrastructure (WESII), 23 - 24 October, 2006, Washington DC. Available as HP Labs Technical Report HPL-2006-125.
-
(2006)
The Workshop on the Economics of Securing the Information Infrastructure (WESII)
-
-
Yearworth, M.1
Monahan, B.2
Pym, D.3
-
28
-
-
84950930899
-
Bayesian prediction and estimation using asymmetric loss functions
-
Zellner, A.: Bayesian prediction and estimation using asymmetric loss functions. J. American Statistical Association 81:446-451, 1986.
-
(1986)
J. American Statistical Association
, vol.81
, pp. 446-451
-
-
Zellner, A.1
-
29
-
-
84922948907
-
Semantics for structured systems modelling and simulation
-
ICST: ACM Digital Library and EU Digital Library ISBN: 78-963-9799-87-5
-
Collinson, M., Monahan, B., and Pym, D.: Semantics for Structured Systems Modelling and Simulation. In Proc. Simutools 2010. ICST: ACM Digital Library and EU Digital Library, 2010. ISBN: 78-963-9799-87-5.
-
(2010)
Proc. Simutools 2010
-
-
Collinson, M.1
Monahan, B.2
Pym, D.3
-
30
-
-
77957901765
-
-
Gnosis. http://www.hpl.hp.com/research/systems-security/gnosis.html.
-
-
-
|