메뉴 건너뛰기




Volumn 51, Issue 3, 2011, Pages 493-505

Decision support for Cybersecurity risk planning

Author keywords

Decision support; Fuzzy sets; Genetic algorithms; IT security

Indexed keywords

CYBER SECURITY; CYBER-ATTACKS; DECISION SUPPORTS; FINANCIAL IMPACTS; IT SECURITY; MANUFACTURING FIRMS; RISK PLANNING; SECURITY COUNTERMEASURES; SYSTEM USE;

EID: 79955908568     PISSN: 01679236     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dss.2011.02.013     Document Type: Article
Times cited : (98)

References (42)
  • 2
    • 0242653680 scopus 로고    scopus 로고
    • Use of genetic algorithms to solve production and operations management problems: A review
    • H. Aytug, M. Khouja, and F.E. Vergara Use of genetic algorithms to solve production and operations management problems: a review International Journal of Production Research 41 2003 3955 4099
    • (2003) International Journal of Production Research , vol.41 , pp. 3955-4099
    • Aytug, H.1    Khouja, M.2    Vergara, F.E.3
  • 3
    • 34848920878 scopus 로고    scopus 로고
    • Necessary measures: Metric-driven information security risk assessment and decision making
    • DOI 10.1145/1290958.1290969, 1290969
    • W.H. Baker, L.P. Rees, and P.S. Tippett Necessary measures: metric-driven information security risk assessment and decision making Communications of the ACM 50 10 October 2007 101 106 (Pubitemid 47505006)
    • (2007) Communications of the ACM , vol.50 , Issue.10 , pp. 101-106
    • Baker, W.H.1    Rees, L.P.2    Tippett, P.S.3
  • 4
    • 33847748221 scopus 로고    scopus 로고
    • Is information security under control?
    • W.H. Baker, and L. Wallace Is information security under control? IEEE Security & Privacy 2007 24 32 January/February 2007
    • (2007) IEEE Security & Privacy , pp. 24-32
    • Baker, W.H.1    Wallace, L.2
  • 6
    • 34848836808 scopus 로고    scopus 로고
    • The State of Information Security 2003
    • S. Berinato The State of Information Security 2003 CIO Magazine 17 2 2003 1 3
    • (2003) CIO Magazine , vol.17 , Issue.2 , pp. 1-3
    • Berinato, S.1
  • 7
    • 35248812867 scopus 로고    scopus 로고
    • Using CP-nets as a guide for countermeasure selection
    • DOI 10.1145/1244002.1244073, Proceedings of the 2007 ACM Symposium on Applied Computing
    • S. Bistarelli, F. Fioravanti, and P. Peretti Using CP-nets as a guide for countermeasure selection Proceedings of the 2007 ACM Symposium on Applied Computing (Seoul, Korea, 2007) 2007 300 304 (Pubitemid 47568302)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 300-304
    • Bistarelli, S.1    Fioravanti, F.2    Peretti, P.3
  • 10
    • 67649529385 scopus 로고    scopus 로고
    • Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
    • H. Cavusoglu, S. Raghunathan, and H. Cavusoglu Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems Information Systems Research 20 2009 198 217
    • (2009) Information Systems Research , vol.20 , pp. 198-217
    • Cavusoglu, H.1    Raghunathan, S.2    Cavusoglu, H.3
  • 11
    • 12944254986 scopus 로고    scopus 로고
    • Fuzzy value-at-risk: Accounting for market liquidity
    • U. Cherubini, and G. Della Lunga Fuzzy value-at-risk: accounting for market liquidity Economic Notes by Banca Monte dei Pascha di Siena SpA 30 2 2001 293 312 (Pubitemid 33755896)
    • (2001) Economic Notes , vol.30 , Issue.2 , pp. 293-312
    • Cherubini, U.1    Della Lunga, G.2
  • 13
    • 16444375607 scopus 로고
    • Fuzzy weighted averages and implementation of the extension principle
    • W.M. Dong, and F.S. Wong Fuzzy weighted averages and implementation of the extension principle Fuzzy Sets and Systems 21 1987 183 199
    • (1987) Fuzzy Sets and Systems , vol.21 , pp. 183-199
    • Dong, W.M.1    Wong, F.S.2
  • 21
    • 79955901491 scopus 로고    scopus 로고
    • IDC, Worldwide and U.S. security services 2006-2010 forecast (accessed December 22, 2006)
    • IDC, Worldwide and U.S. security services 2006-2010 forecast, http://www.idc.com/getdoc.jsp?containerId=200926 (accessed December 22, 2006).
  • 22
    • 0035247535 scopus 로고    scopus 로고
    • Centroid of a type-2 fuzzy set
    • DOI 10.1016/S0020-0255(01)00069-X, PII S002002550100069X
    • N. Karnik, and J. Mendel Centroid of a type-2 fuzzy set Information Sciences 132 2001 195 220 (Pubitemid 32273094)
    • (2001) Information Sciences , vol.132 , Issue.1-4 , pp. 195-220
    • Karnik, N.N.1    Mendel, J.M.2
  • 23
    • 36849072444 scopus 로고    scopus 로고
    • Quantitative risk-based analysis for military counterterrorism systems
    • DOI 10.1002/sys.20075
    • E. Kujawski, and G.A. Miller Quantitative risk-based analysis for military counterterrorism systems Systems Engineering 10 4 2007 273 289 (Pubitemid 350229691)
    • (2007) Systems Engineering , vol.10 , Issue.4 , pp. 273-289
    • Kujawski, E.1    Miller, G.A.2
  • 24
    • 4544317814 scopus 로고    scopus 로고
    • A fuzzy decision support systems for strategic portfolio management
    • C. Lin, and P. Hsieh A fuzzy decision support systems for strategic portfolio management Decision Support Systems 38 2004 383 398
    • (2004) Decision Support Systems , vol.38 , pp. 383-398
    • Lin, C.1    Hsieh, P.2
  • 25
    • 79955911873 scopus 로고    scopus 로고
    • 2010 Lohr, Steve, The New York Times, Companies Fight Endless War Against Computer Attacks, January 18 Accessed February 14
    • Lohr, Steve, The New York Times, Companies Fight Endless War Against Computer Attacks, January 18, 2010, http://www.nytimes.com/2010/01/18/ technology/internet/18defend.html, accessed February 14, 2010.
    • (2010)
  • 26
    • 13944255907 scopus 로고    scopus 로고
    • Fuzzy decision support system for risk analysis in e-commerce development
    • DOI 10.1016/j.dss.2003.12.002, PII S0167923604000272
    • E. Ngai, and F. Wat Fuzzy decision support system for risk analysis in E-commerce development Decision Support Systems 40 2005 235 255 (Pubitemid 40266063)
    • (2005) Decision Support Systems , vol.40 , Issue.2 , pp. 235-255
    • Ngai, E.W.T.1    Wat, F.K.T.2
  • 27
    • 0026982010 scopus 로고
    • A defuzzification strategy for a fuzzy logic controller employing prohibitive information in command formulation
    • N. Pfluger, J. Yen, and R. Langari A defuzzification strategy for a fuzzy controller employing prohibitive information in command formulation Proceedings of the IEEE International Conference on Fuzzy Systems (San Diego, CA, 1992) 1992 717 723 (Pubitemid 23590980)
    • (1992) IEEE Int Conf Fuzzy Syst FUZZ-IEEE 92 , pp. 717-723
    • Pfluger Nathan1    Yen John2    Langari Reza3
  • 28
    • 79955912393 scopus 로고    scopus 로고
    • PITAC (President's Information Technology Advisory Council, National Coordination Office for Information Technology Research and Development, Arlington, VA, 2005)
    • PITAC, Report to the President - Cyber Security: A Crisis of Prioritization (President's Information Technology Advisory Council, National Coordination Office for Information Technology Research and Development, Arlington, VA, 2005).
    • Report to the President - Cyber Security: A Crisis of Prioritization
  • 33
    • 0031076949 scopus 로고    scopus 로고
    • Selection of appropriate defuzzification methods using application specific properties
    • PII S106367069700043X
    • T. Runkler Selection of appropriate defuzzification methods using application specific properties IEEE Transactions on Fuzzy Systems 5 1 1997 72 79 (Pubitemid 127772312)
    • (1997) IEEE Transactions on Fuzzy Systems , vol.5 , Issue.1 , pp. 72-79
    • Runkler, T.A.1
  • 36
    • 33750448993 scopus 로고    scopus 로고
    • A fuzzy decision support system for IT Service Continuity threat assessment
    • DOI 10.1016/j.dss.2006.05.002, PII S0167923606000716
    • B. Van de Walle, and A. Rutkowski A fuzzy decision support system for IT service continuity threat assessment Decision Support Systems 42 2006 1931 1943 (Pubitemid 44649338)
    • (2006) Decision Support Systems , vol.42 , Issue.3 , pp. 1931-1943
    • Van De Walle, B.1    Rutkowski, A.-F.2
  • 38
    • 0015558134 scopus 로고
    • Outline of a new approach to the analysis of complex systems and decision processes
    • L.A. Zadeh Outline of a new approach to the analysis of complex systems and decision processes Transactions on Systems, Man and Cybernetics, SMC-3 1973 28 44
    • (1973) Transactions on Systems, Man and Cybernetics, SMC-3 , pp. 28-44
    • Zadeh, L.A.1
  • 39
    • 0016458950 scopus 로고
    • The concept of a linguistic variable and its application to approximate reasoning
    • L.A. Zadeh The concept of a linguistic variable and its application to approximate reasoning Information Science 8 1975 199 249
    • (1975) Information Science , vol.8 , pp. 199-249
    • Zadeh, L.A.1
  • 40
    • 49349133217 scopus 로고
    • Fuzzy sets as a basis for a theory of possibility
    • L.A. Zadeh Fuzzy sets as a basis for a theory of possibility Fuzzy Sets and Systems 1 1978 3 28
    • (1978) Fuzzy Sets and Systems , vol.1 , pp. 3-28
    • Zadeh, L.A.1
  • 41
    • 0001096516 scopus 로고
    • A theory of approximate reasoning
    • L.A. Zadeh A theory of approximate reasoning Machine Intelligence 9 1979 149 194
    • (1979) Machine Intelligence , vol.9 , pp. 149-194
    • Zadeh, L.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.