-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inform. System Security 3(3) 186-205.
-
(2000)
ACM Trans. Inform. System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
2
-
-
24944551545
-
Passenger grouping under constant threat probability in an airport security system
-
Babu, V., R. Batta, L. Lin. 2006. Passenger grouping under constant threat probability in an airport security system. Eur. J. Oper. Res. 168(2) 633-644.
-
(2006)
Eur. J. Oper. Res.
, vol.168
, Issue.2
, pp. 633-644
-
-
Babu, V.1
Batta, R.2
Lin, L.3
-
3
-
-
77958486763
-
Trust no one at the airport
-
Barnett, A. 2003. Trust no one at the airport. OR/MS Today 30(1) 72.
-
(2003)
OR/MS Today
, vol.30
, Issue.1
, pp. 72
-
-
Barnett, A.1
-
5
-
-
0002127462
-
Airline safety: The last decade
-
Barnett, A., M. Higgins. 1989. Airline safety: The last decade. Management Sci. 35(1) 1-21.
-
(1989)
Management Sci
, vol.35
, Issue.1
, pp. 1-21
-
-
Barnett, A.1
Higgins, M.2
-
6
-
-
0000787258
-
Crime and punishment: An economic approach
-
Becker, G. 1968. Crime and punishment: An economic approach. J. Political Econom. 76(2) 169-217.
-
(1968)
J. Political Econom.
, vol.76
, Issue.2
, pp. 169-217
-
-
Becker, G.1
-
7
-
-
0031191630
-
The use of the area under the roc curve in the evaluation of machine learning algorithms
-
Bradley, A. 1997. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition 30(7) 1145-1159.
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.1
-
8
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu, H., S. Raghunathan. 2004. Configuration of detection software: A comparison of decision and game theory approaches. Decision Anal. 1(3) 131-148.
-
(2004)
Decision Anal
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
9
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., B. Mishra, S. Raghunathan. 2005. The value of intrusion detection systems in information technology security architecture. Inform. Systems Res. 16(1) 28-46.
-
(2005)
Inform. Systems Res.
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
10
-
-
67649529385
-
Impact of configuration on the value of and the interaction between information security technologies: The case of firewalls and intrusion detection systems
-
Cavusoglu, H., S. Raghunathan, H. Cavusoglu. 2009. Impact of configuration on the value of and the interaction between information security technologies: The case of firewalls and intrusion detection systems. Inform. Systems Res. 20(2) 198-217.
-
(2009)
Inform. Systems Res.
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
11
-
-
4544354023
-
Carnival booth: An algorithm for defeating the computer-assisted passenger screening system
-
Chakrabarti, S., A. Strauss. 2002. Carnival booth: An algorithm for defeating the computer-assisted passenger screening system. First Monday 7(10).
-
(2002)
First Monday
, vol.7
, pp. 10
-
-
Chakrabarti, S.1
Strauss, A.2
-
12
-
-
33751216500
-
Crime minimization and racial bias: What can we learn from police search data? Econom
-
Dominitz, J., J. Knowles. 2006. Crime minimization and racial bias: What can we learn from police search data? Econom. J. 116(515) 368-384.
-
(2006)
J.
, vol.116
, Issue.515
, pp. 368-384
-
-
Dominitz, J.1
Knowles, J.2
-
13
-
-
33751247671
-
Assessing racial profiling
-
Durlauf, S. 2006. Assessing racial profiling. Econom. J. 116(515) 402-426.
-
(2006)
Econom. J.
, vol.116
, Issue.515
, pp. 402-426
-
-
Durlauf, S.1
-
14
-
-
3943113723
-
A differential games solution to a model of competition between a thief and the police
-
Feichtinger, G. 1983. A differential games solution to a model of competition between a thief and the police. Management Sci. 29(6) 686-699.
-
(1983)
Management Sci
, vol.29
, Issue.6
, pp. 686-699
-
-
Feichtinger, G.1
-
15
-
-
0020083498
-
The meaning and use of the area under a receiver operating characteristics (roc) curve
-
Hanley, J., B. McNeil. 1982. The meaning and use of the area under a receiver operating characteristics (ROC) curve. Radiology 143(1) 29-36.
-
(1982)
Radiology
, vol.143
, Issue.1
, pp. 29-36
-
-
Hanley, J.1
McNeil, B.2
-
16
-
-
77958466681
-
Shadow hunter
-
Harris, S. 2007. Shadow hunter. National J. 18-24.
-
(2007)
National J
, pp. 18-24
-
-
Harris, S.1
-
18
-
-
33645324247
-
Assessing the impact of deterrence on aviation checked baggage screening strategies
-
Jacobson, S., T. Karnani, J. Kobza. 2005. Assessing the impact of deterrence on aviation checked baggage screening strategies. Internat. J. Risk Assessment and Management 5(1) 1-15.
-
(2005)
Internat. J. Risk Assessment and Management
, vol.5
, Issue.1
, pp. 1-15
-
-
Jacobson, S.1
Karnani, T.2
Kobza, J.3
-
19
-
-
33645307416
-
A cost-benefit analysis of alternative device configurations for aviation-checked baggage security screening
-
Jacobson, S., T. Karnani, J. Kobza. 2006. A cost-benefit analysis of alternative device configurations for aviation-checked baggage security screening. Risk Anal. 26(2) 297-310.
-
(2006)
Risk Anal
, vol.26
, Issue.2
, pp. 297-310
-
-
Jacobson, S.1
Karnani, T.2
Kobza, J.3
-
20
-
-
0035452522
-
A detection theoretic approach to modeling aviation security problems using the knapsack problem
-
Jacobson, S., J. Kobza, A. Easterling. 2001. A detection theoretic approach to modeling aviation security problems using the knapsack problem. IIE Trans. 33(9) 747-759.
-
(2001)
IIE Trans
, vol.33
, Issue.9
, pp. 747-759
-
-
Jacobson, S.1
Kobza, J.2
Easterling, A.3
-
21
-
-
0037336210
-
Modeling aviation baggage screening security systems: A case study
-
Jacobson, S., J. Virta, J. Bowman, J. Kobza, J. Nestor. 2003. Modeling aviation baggage screening security systems: A case study. IIE Trans. 35(3) 259-269.
-
(2003)
IIE Trans
, vol.35
, Issue.3
, pp. 259-269
-
-
Jacobson, S.1
Virta, J.2
Bowman, J.3
Kobza, J.4
Nestor, J.5
-
22
-
-
71649115794
-
Selective screening of rail passengers
-
San Jose State University, San Jose, CA
-
Jenkins, B. M., B. R. Butterworth. 2007. Selective screening of rail passengers. Report, Mineta Transportation Institute, San Jose State University, San Jose, CA.
-
(2007)
Report Mineta Transportation Institute
-
-
Jenkins, B.M.1
Butterworth, B.R.2
-
24
-
-
0035082911
-
Racial bias in motor-vehicle searches: Theory and evidence
-
Knowles, J., N. Persico, P. Todd. 2001. Racial bias in motor-vehicle searches: Theory and evidence. J. Political Econom. 109(1) 203-229.
-
(2001)
J. Political Econom.
, vol.109
, Issue.1
, pp. 203-229
-
-
Knowles, J.1
Persico, N.2
Todd, P.3
-
25
-
-
0031102942
-
Probability models for access security system architectures
-
Kobza, J., S. Jacobson. 1997. Probability models for access security system architectures. J. Oper. Res. Soc. 48(3) 255-263.
-
(1997)
J. Oper. Res. Soc.
, vol.48
, Issue.3
, pp. 255-263
-
-
Kobza, J.1
Jacobson, S.2
-
26
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann, R., R. Cunningham. 2000. Improving intrusion detection performance using keyword selection and neural networks. Comput. Networks 34 597-603.
-
(2000)
Comput. Networks
, vol.34
, pp. 597-603
-
-
Lippmann, R.1
Cunningham, R.2
-
27
-
-
33751232053
-
Profiling: Introduction to the feature
-
Manski, C. 2006a. Profiling: Introduction to the feature. Econom. J. 116(515) 347-350.
-
(2006)
Econom. J.
, vol.116
, Issue.515
, pp. 347-350
-
-
Manski, C.1
-
28
-
-
33751233581
-
Search profiling with partial knowledge of deterrence
-
Manski, C. 2006b. Search profiling with partial knowledge of deterrence. Econom. J. 116(515) 385-401.
-
(2006)
Econom. J.
, vol.116
, Issue.515
, pp. 385-401
-
-
Manski, C.1
-
29
-
-
0001730423
-
The inequalities that determine the bargaining set
-
Maschler, M. 1966. The inequalities that determine the bargaining set. Israel J. Math. 4 127-134.
-
(1966)
Israel J. Math.
, vol.4
, pp. 127-134
-
-
Maschler, M.1
-
30
-
-
0000278207
-
An advantage of the bargaining set over the core
-
Maschler, M. 1976. An advantage of the bargaining set over the core. J. Econom. Theory 13 184-192.
-
(1976)
J. Econom. Theory
, vol.13
, pp. 184-192
-
-
Maschler, M.1
-
31
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
McHugh, J., A. Christie, J. Allen. 2000. Defending yourself: The role of intrusion detection systems. IEEE Software 17(5) 42-51.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
33
-
-
33645669627
-
A multilevel passenger screening problem for aviation security
-
McLay, L., S. Jacobson, J. Kobza. 2006. A multilevel passenger screening problem for aviation security. Naval Res. Logist. 53(3) 183-197.
-
(2006)
Naval Res. Logist.
, vol.53
, Issue.3
, pp. 183-197
-
-
McLay, L.1
Jacobson, S.2
Kobza, J.3
-
34
-
-
77958463119
-
The tradeoff between technology and prescreening intelligence in checked baggage screening for aviation security
-
McLay, L., S. Jacobson, J. Kobza. 2008. The tradeoff between technology and prescreening intelligence in checked baggage screening for aviation security. J. Transportation Security 1(2) 107-126.
-
(2008)
J. Transportation Security
, vol.1
, Issue.2
, pp. 107-126
-
-
McLay, L.1
Jacobson, S.2
Kobza, J.3
-
35
-
-
0031161247
-
Environmental regulations and incentives for compliance audits
-
Mishra, B., P. Newman, C. Stinson. 1997. Environmental regulations and incentives for compliance audits. J. Accounting Public Policy 16(2) 187-214.
-
(1997)
J. Accounting Public Policy
, vol.16
, Issue.2
, pp. 187-214
-
-
Mishra, B.1
Newman, P.2
Stinson, C.3
-
36
-
-
0000028277
-
Monitoring vis-aacute;-vis investigation in enforcement of law
-
Mookherjee, D., I. P. L. Png. 1992. Monitoring vis-aacute;-vis investigation in enforcement of law. Amer. Econom. Rev. 82(3) 556-565.
-
(1992)
Amer. Econom. Rev.
, vol.82
, Issue.3
, pp. 556-565
-
-
Mookherjee, D.1
Png, I.P.L.2
-
37
-
-
77958497102
-
-
Statement to the White House Commission on Aviation Safety and Security. Electronic Privacy Information Center. September 5
-
Nojeim, G. 1996. Civil liberties implications of airport security measures. Statement to the White House Commission on Aviation Safety and Security. Electronic Privacy Information Center. September 5, http://epic.org/privacy/faa/aclu-testimony.html.
-
(1996)
Civil Liberties Implications of Airport Security Measures
-
-
Nojeim, G.1
-
38
-
-
61349169100
-
Intrusion-detection policies for it security breaches
-
Ogut, H., H. Cavusoglu, S. Raghunathan. 2008. Intrusion-detection policies for IT security breaches. INFORMS J. Comput. 20(1) 112-123.
-
(2008)
INFORMS J. Comput.
, vol.20
, Issue.1
, pp. 112-123
-
-
Ogut, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
39
-
-
33751243069
-
Generalising the hit rates test for racial bias in law enforcement, with an application to vehicle searches in wichita
-
Persico, N., P. Todd. 2006. Generalising the hit rates test for racial bias in law enforcement, with an application to vehicle searches in Wichita. Econom. J. 116(515) 351-367.
-
(2006)
Econom. J.
, vol.116
, Issue.515
, pp. 351-367
-
-
Persico, N.1
Todd, P.2
-
40
-
-
84977413772
-
The optimal trade-off between the probability and magnitude of fines
-
Polinsky, M., S. Shavell. 1979. The optimal trade-off between the probability and magnitude of fines. Amer. Econom. Rev. 69(5) 880-891.
-
(1979)
Amer. Econom. Rev.
, vol.69
, Issue.5
, pp. 880-891
-
-
Polinsky, M.1
Shavell, S.2
-
41
-
-
77958498399
-
-
Working paper, the University of Texas at Dallas.
-
Raghunathan, S., H. Cavusoglu, B. Mai. 2007. Economics of user segmentation, profiling, and screening in security. Working paper, the University of Texas at Dallas.
-
(2007)
Economics of User Segmentation Profiling and Screening in Security
-
-
Raghunathan, S.1
Cavusoglu, H.2
Mai, B.3
-
42
-
-
0000978632
-
-
P. Portney, R. Stavins, eds. Public Policies for Environmental Protection. Resources for the Future, Johns Hopkins University Press, Washington, DC.
-
Russell, C. 1990. Monitoring and Enforcement. P. Portney, R. Stavins, eds. Public Policies for Environmental Protection. Resources for the Future, Johns Hopkins University Press, Washington, DC.
-
(1990)
Monitoring and Enforcement
-
-
Russell, C.1
-
43
-
-
61349148588
-
Improving intrusion prevention models: Dual- threshold and dual-filter approaches
-
Ryu, Y., H. Rhee. 2008. Improving intrusion prevention models: Dual- threshold and dual-filter approaches. INFORMS J. Comput. 20(3) 356-367.
-
(2008)
INFORMS J. Comput.
, vol.20
, Issue.3
, pp. 356-367
-
-
Ryu, Y.1
Rhee, H.2
-
44
-
-
77955647724
-
Why data mining won't stop terror
-
March 9
-
Schneier, B. 2006. Why data mining won't stop terror. Wired News. March 9, http://www.wired.com/politics/security/commentary/securitymatters/2006/03/ 70357.
-
(2006)
Wired News
-
-
Schneier, B.1
-
45
-
-
84935455314
-
Specific versus general enforcement of the law
-
Shavell, S. 1991. Specific versus general enforcement of the law. J. Political Econom. 99(5) 1088-1108.
-
(1991)
J. Political Econom.
, vol.99
, Issue.5
, pp. 1088-1108
-
-
Shavell, S.1
-
46
-
-
0000975826
-
The optimum enforcement of laws
-
Stigler, G. 1970. The optimum enforcement of laws. J. Political Econom. 78(3) 526-536.
-
(1970)
J. Political Econom.
, vol.78
, Issue.3
, pp. 526-536
-
-
Stigler, G.1
-
47
-
-
0000064294
-
An infiltration game with time dependent payoff
-
Thomas, M., Y. Nisgav. 1976. An infiltration game with time dependent payoff. Naval Res. Logist. Quart. 23 297-302.
-
(1976)
Naval Res. Logist. Quart.
, vol.23
, pp. 297-302
-
-
Thomas, M.1
Nisgav, V.2
-
49
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J., J. Gaffney. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1) 35-50.
-
(2004)
Decision Anal
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.1
Gaffney, J.2
-
50
-
-
0141816735
-
Analyzing the cost of screening selectee and non-selectee baggage
-
Virta, J., S. Jacobson, J. Kobza. 2003. Analyzing the cost of screening selectee and non-selectee baggage. Risk Anal. 23(5) 897-908.
-
(2003)
Risk Anal
, vol.23
, Issue.5
, pp. 897-908
-
-
Virta, J.1
Jacobson, S.2
Kobza, J.3
-
51
-
-
0038801438
-
Sacrificing civil liberties to reduce terrorism risks
-
Viscusi, W., R. Zeckhauser. 2003. Sacrificing civil liberties to reduce terrorism risks. J. Risk Uncertainty 26(2/3) 99-120.
-
(2003)
J. Risk Uncertainty
, vol.26
, Issue.2-3
, pp. 99-120
-
-
Viscusi, W.1
Zeckhauser, R.2
|