-
1
-
-
77954250852
-
An empirical analysis of software vendors' patch release behavior: Impact of vulnerability disclosure
-
Arora, A., Krishnan, R., Telang, R., and Yang, Y. 2010. "An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure," Information Systems Research. (21:1), pp. 115-132.
-
(2010)
Information Systems Research
, vol.21
, Issue.1
, pp. 115-132
-
-
Arora, A.1
Krishnan, R.2
Telang, R.3
Yang, Y.4
-
2
-
-
0003217728
-
The methodology of n-Version programming
-
M. R. Lyu (ed.), New York: Wiley
-
Avizienis, A. 1995. "The Methodology of n-Version Programming," Chapter 2 in Software Fault Tolerance, M. R. Lyu (ed.), New York: Wiley.
-
(1995)
Chapter 2 in Software Fault Tolerance
-
-
Avizienis, A.1
-
3
-
-
33745585989
-
Diversity as a defense strategy in information systems
-
Bedford, MA
-
Bain, C., Faatz, D., Fayad, A., and Williams, D. 2001. "Diversity as a Defense Strategy in Information Systems," Technical Report, The MITRE Corporation, Bedford, MA.
-
(2001)
Technical Report, the MITRE Corporation
-
-
Bain, C.1
Faatz, D.2
Fayad, A.3
Williams, D.4
-
4
-
-
21844470195
-
On correlated failures in survivable storage systems, 2002
-
Carnegie Mellon University, School of Computer Science, Pittsburgh, PA
-
Bakkaloglu, M., Wylie, J., Wang, C., and Ganger, G. 2002. "On Correlated Failures in Survivable Storage Systems, 2002," Technical Report CMU-CS-02-129, Carnegie Mellon University, School of Computer Science, Pittsburgh, PA.
-
(2002)
Technical Report CMU-CS-02-129
-
-
Bakkaloglu, M.1
Wylie, J.2
Wang, C.3
Ganger, G.4
-
5
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
th ACM Conference on Computer and Communications Security, October 27-30, Washington, DC, pp. 281-289. (Pubitemid 40673810)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Palmer, T.S.2
Ackley, D.H.3
Stefanovic, D.4
Forrest, S.5
Zovi, D.D.6
-
6
-
-
0006298293
-
Network externalities in microcomputer software: An econometric analysis of the spreadsheet market
-
Brynjolfsson, E., and Kemerer, C. 1996. "Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreadsheet Market," Management Science (42:12), pp. 1627-2647.
-
(1996)
Management Science
, vol.42
, Issue.12
, pp. 1627-2647
-
-
Brynjolfsson, E.1
Kemerer, C.2
-
7
-
-
80051762247
-
A model for opportunistic network exploits: The case of P2P worms
-
June 26-28, University of Cambridge, UK, available online
-
Collins, M., Gates, C., and Kataria, G. 2006. "A Model for Opportunistic Network Exploits: The Case of P2P Worms," in Proceedings of the Fifth Workshop on the Economics of Information Security, June 26-28, University of Cambridge, UK (available online, http://weis2006.econinfosec.org/ docs/16.pdf).
-
(2006)
Proceedings of the Fifth Workshop on the Economics of Information Security
-
-
Collins, M.1
Gates, C.2
Kataria, G.3
-
8
-
-
81055157683
-
Diversity against accidental and deliberate faults
-
Los Alamitos, CA: IEEE Computer Society
-
Deswarte, Y., Kanoun, K., and Laprie, J. C. 1998. "Diversity Against Accidental and Deliberate Faults," in Proceedings of Computer Security, Dependability and Assurance: From Needs to Solutions, Los Alamitos, CA: IEEE Computer Society, pp. 171-181.
-
(1998)
Proceedings of Computer Security, Dependability and Assurance: From Needs to Solutions
, pp. 171-181
-
-
Deswarte, Y.1
Kanoun, K.2
Laprie, J.C.3
-
9
-
-
3042705697
-
Approximation for bursty (and Smoothed) arrival queuing delays based on generalized peakedness
-
Kyoto
-
Eckberg, A. 1985. "Approximation for Bursty (and Smoothed) Arrival Queuing Delays Based on Generalized Peakedness," in Proceedings of the 11th International Teletraffic Congress, Kyoto.
-
(1985)
Proceedings of the 11th International Teletraffic Congress
-
-
Eckberg, A.1
-
11
-
-
66049101414
-
Coordination and lock-in: Competition with switching costs and network effects
-
M. Armstrong and R. Porter (eds.), Amsterdam: North Holland
-
Farrell, J., and Klemperer, P. 2001. "Coordination and Lock-In: Competition with Switching Costs and Network Effects," Chapter 31 in Handbook of Industrial Organization (Volume 3), M. Armstrong and R. Porter (eds.), Amsterdam: North Holland.
-
(2001)
Chapter 31 in Handbook of Industrial Organization
, vol.3
-
-
Farrell, J.1
Klemperer, P.2
-
12
-
-
14844282642
-
-
available online
-
Geer, D., Bace, R., Gutmann, P., Metzger, P, Pfleeger, C. P., Quarterman, J. S., and Schneier, B. 2003. "Cyber Insecurity: The Cost of Monopoly" (available online, http://www.ccianet.org/CCIA/files/ ccLibraryFiles/Filename/000000000061/cyberinsecurity.pdf).
-
(2003)
Cyber Insecurity: The Cost of Monopoly
-
-
Geer, D.1
Bace, R.2
Gutmann, P.3
Metzger, P.4
Pfleeger, C.P.5
Quarterman, J.S.6
Schneier, B.7
-
13
-
-
0002942943
-
Rules for ordering uncertain prospects
-
Hadar, J., and Russell, W. 1969. "Rules for Ordering Uncertain Prospects," American Economic Review (59), pp. 25-34.
-
(1969)
American Economic Review
, vol.59
, pp. 25-34
-
-
Hadar, J.1
Russell, W.2
-
14
-
-
84858940547
-
-
Honeynet Project, available online
-
Honeynet Project. 2004. "Know Your Enemy: Trends" (available online, http://old.honeynet.org/papers/enemy/).
-
(2004)
Know Your Enemy: Trends
-
-
-
16
-
-
20944441343
-
Market for software vulnerabilities? Think again
-
Kannan, K., and Telang, R. "Market for Software Vulnerabilities? Think Again," Management Science (51:5), pp. 726-740.
-
Management Science
, vol.51
, Issue.5
, pp. 726-740
-
-
Kannan, K.1
Telang, R.2
-
17
-
-
85020616309
-
Network externalities, competition, and compatibility
-
Katz, M. L., and Shapiro, C. 1985. "Network Externalities, Competition, and Compatibility," American Economic Review (75:3), pp. 424-440.
-
(1985)
American Economic Review
, vol.75
, Issue.3
, pp. 424-440
-
-
Katz, M.L.1
Shapiro, C.2
-
18
-
-
84936407456
-
Technology adoption in the presence of network externalities
-
Katz, M. L., and Shapiro, C. 1986. "Technology Adoption in the Presence of Network Externalities," Journal of Political Economy (94:4), pp. 822-841.
-
(1986)
Journal of Political Economy
, vol.94
, Issue.4
, pp. 822-841
-
-
Katz, M.L.1
Shapiro, C.2
-
19
-
-
0002981164
-
Systems competition and network effects
-
Katz, M. L., and Shapiro, C. 1994. "Systems Competition and Network Effects," Journal of Economic Perspectives (8:2), pp. 93-115.
-
(1994)
Journal of Economic Perspectives
, vol.8
, Issue.2
, pp. 93-115
-
-
Katz, M.L.1
Shapiro, C.2
-
21
-
-
0041755428
-
-
New York: John Wiley and Sons
-
Kleinrock, L. 1975. Queuing Theory (Volume 1), New York: John Wiley and Sons.
-
(1975)
Queuing Theory
, vol.1
-
-
Kleinrock, L.1
-
22
-
-
0037786763
-
Interdependent security
-
Kunreuther, H., and Heal, G. 2003. "Interdependent Security," Journal of Risk and Uncertainty (26:2/3), pp. 231-249.
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2-3
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
23
-
-
35548965096
-
An examination of private intermediaries' roles in software vulnerabilities disclosure
-
DOI 10.1007/s10796-007-9047-2
-
Li, P., and Rao, H. R. 2007. "An Examination of Private Intermediaries' Roles in Software Vulnerabilities Disclosure," Information Systems Frontiers (9:5), pp. 531-539. (Pubitemid 350007347)
-
(2007)
Information Systems Frontiers
, vol.9
, Issue.5
, pp. 531-539
-
-
Li, P.1
Rao, H.R.2
-
24
-
-
0025400024
-
Modeling of correlated failures and community error recovery in multiversion software
-
DOI 10.1109/32.48942
-
Nicola, V. F., and Goyal, A. 1990. "Modeling of Correlated Failures and Community Error Recovery in Multiversion Software," IEEE Transactions on Software Engineering (16:3), pp. 350-359. (Pubitemid 20678681)
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.3
, pp. 350-359
-
-
Nicola Victor, F.1
Goyal Ambuj2
-
25
-
-
80455162753
-
Cyber insurance and IT security investment: Impact of independent risk
-
Harvard University, Cambridge, MA (available online)
-
Ogut, H., Menon, N., and Ragunathan, S. 2005. "Cyber Insurance and IT Security Investment: Impact of Independent Risk," in Proceedings of the Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (available online, http://infosecon.net/workshop/pdf/56.pdf)
-
(2005)
Proceedings of the Workshop on the Economics of Information Security (WEIS)
-
-
Ogut, H.1
Menon, N.2
Ragunathan, S.3
-
26
-
-
33947496984
-
Short Term and Total Life Impact analysis of email worms in computer systems
-
DOI 10.1016/j.dss.2006.12.014, PII S0167923607000036, Integrated Decision Support
-
Park, I., Sharman, R., Rao, H. R., and Upadhyaya, S. 2007. "Short Term and Total Life Impact Analysis of Email Worms in Computer Systems," Decision Support Systems (43), pp. 827-841. (Pubitemid 46466992)
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 827-841
-
-
Park, I.1
Sharman, R.2
Rao, H.R.3
Upadhyaya, S.4
-
27
-
-
12344299716
-
-
unpublished paper, University of California, Berkeley (available online)
-
Patterson, D. 2002. "A Simple Way to Estimate the Cost of Downtime," unpublished paper, University of California, Berkeley (available online, http://roc.cs.berkeley.edu/projects/downtime).
-
(2002)
A Simple Way to Estimate the Cost of Downtime
-
-
Patterson, D.1
-
29
-
-
49649157588
-
Increasing risk: II. Its economics consequences
-
Rothschild, M., and Stiglitz, J. 1971. "Increasing Risk: II. Its Economics Consequences," Journal of Economic Theory (3), pp. 66-84.
-
(1971)
Journal of Economic Theory
, vol.3
, pp. 66-84
-
-
Rothschild, M.1
Stiglitz, J.2
-
32
-
-
0024942312
-
Delay analysis of a single server queue with Poisson cluster arrival process arising in ATM networks
-
Sohraby, K. 1989. "Delay Analysis of a Single Server Queue with Poisson Cluster Arrival Process Arising in ATM Networks," in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), November 27-30, pp. 611-616. (Pubitemid 20702437)
-
(1989)
IEEE Global Telecommunications Conference and Exhibition
, vol.1
, pp. 611-616
-
-
Sohraby Khosrow1
-
33
-
-
85106078759
-
Framing of information security policies and practices
-
D. Straub, S. Goodman and R. Baskerville (eds.), Armonk, NY: M. E. Sharpe
-
Straub, D., Goodman, S., and Baskerville, R. 2008. "Framing of Information Security Policies and Practices," in Information Security Policies, Processes, and Practices, D. Straub, S. Goodman and R. Baskerville (eds.), Armonk, NY: M. E. Sharpe, pp. 5-12.
-
(2008)
Information Security Policies, Processes, and Practices
, pp. 5-12
-
-
Straub, D.1
Goodman, S.2
Baskerville, R.3
-
34
-
-
80051757742
-
Symantec internet security threat report volume IX
-
Symantec Corporation, 20330 Stevens Creek Road, Cupertino CA, 2006
-
Symantec Corporation. 2006. "Symantec Internet Security Threat Report, Volume IX," The Symantec Corporation, 20330 Stevens Creek Road, Cupertino CA, 2006.
-
(2006)
The Symantec Corporation
-
-
|