-
1
-
-
77955317474
-
Key elements of an information security program
-
J.P. Pironti, "Key Elements of an Information Security Program," Information Systems Control J., vol. 1, 2005.
-
(2005)
Information Systems Control J.
, vol.1
-
-
Pironti, J.P.1
-
3
-
-
77955339808
-
-
Mar.
-
C. Beard, "Introducing Test Pilot," http://labs.mozilla.com/ 2008/03/introducing-test-pilot/, Mar. 2008.
-
(2008)
Introducing Test Pilot
-
-
Beard, C.1
-
4
-
-
33750950152
-
Evaluating information security investments from attackers perspective: The Return-On-Attack (ROA)
-
M. Cremonini, "Evaluating Information Security Investments from Attackers Perspective: The Return-On-Attack (ROA)," Proc. Fourth Workshop the Economics of Information Security, 2005.
-
(2005)
Proc. Fourth Workshop the Economics of Information Security
-
-
Cremonini, M.1
-
5
-
-
77955317851
-
A learning-based approach to reactive security
-
A. Barth, B.I.P. Rubinstein, M. Sundararajan, J.C. Mitchell, D. Song, and P.L. Bartlett, "A Learning-Based Approach to Reactive Security," Proc. 14th Int'l Conf. Financial Cryptography and Data Security (FC '10), pp 192-206, 2010.
-
(2010)
Proc. 14th Int'l Conf. Financial Cryptography and Data Security (FC '10)
, pp. 192-206
-
-
Barth, A.1
Rubinstein, B.I.P.2
Sundararajan, M.3
Mitchell, J.C.4
Song, D.5
Bartlett, P.L.6
-
6
-
-
85071546401
-
-
July
-
D. Fisher, "Multi-Process Architecture," http://dev.chromium. org/developers/design-documents/multi-process-architecture, July 2008.
-
(2008)
Multi-Process Architecture
-
-
Fisher, D.1
-
8
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G.M. Voelker, V. Paxson, and S. Savage, "Spamalytics: An Empirical Analysis of Spam Marketing Conversion," Proc. ACM Conf. Computer and Comm. Security, pp. 3-14, 2008.
-
(2008)
Proc. ACM Conf. Computer and Comm. Security
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
9
-
-
58849165586
-
Home pcs rented out in sabotage-for-hire racket
-
July
-
B. Warner, "Home PCs Rented Out in Sabotage-for-Hire Racket," Reuters, July 2004.
-
(2004)
Reuters
-
-
Warner, B.1
-
10
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants," Proc. ACM Conf. Computer and Comm. Security, pp. 375-388, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
11
-
-
77954317163
-
Attack surface: Mitigate security risks by minimizing the code you expose to untrusted users
-
Nov.
-
M. Howard, "Attack Surface: Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users," MSDN Magazine, http://msdn.microsoft.com/en-us/magazine/cc163882.aspx, Nov. 2004.
-
(2004)
MSDN Magazine
-
-
Howard, M.1
-
12
-
-
14744276335
-
Is finding security holes a good idea?
-
DOI 10.1109/MSP.2005.17
-
E. Rescorla, "Is Finding Security Holes a Good Idea?," IEEE Security and Privacy, vol. 3, no. 1, pp. 14-19, Jan./Feb. 2005. (Pubitemid 40325577)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 14-19
-
-
Rescorla, E.1
-
13
-
-
33746375688
-
Design is as easy as optimization
-
DOI 10.1007/11786986-42, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
D. Chakrabarty, A. Mehta, and V.V. Vazirani, "Design is As Easy As Optimization," Proc. 33rd Int'l Colloquium Automata, Languages and Programming (ICALP), pp. 477-488, 2006. (Pubitemid 44113322)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4051
, pp. 477-488
-
-
Chakrabarty, D.1
Mehta, A.2
Vazirani, V.V.3
-
14
-
-
0032208221
-
The cost of achieving the best portfolio in hindsight
-
E. Ordentlich and T.M. Cover, "The Cost of Achieving the Best Portfolio in Hindsight," Math. of Operations Research, vol. 23, no. 4, pp. 960-982, 1998. (Pubitemid 128508566)
-
(1998)
Mathematics of Operations Research
, vol.23
, Issue.4
, pp. 960-982
-
-
Ordentlich, E.1
Cover, T.M.2
-
15
-
-
0002267135
-
Adaptive game playing using multiplicative weights
-
Y. Freund and R.E. Schapire, "Adaptive Game Playing Using Multiplicative Weights," Games and Economic Behavior, vol. 29, pp. 79-103, 1999.
-
(1999)
Games and Economic Behavior
, vol.29
, pp. 79-103
-
-
Freund, Y.1
Schapire, R.E.2
-
16
-
-
0001963082
-
A short introduction to boosting
-
Y. Freund and R. Schapire, "A Short Introduction to Boosting," J. Japanese Soc. for Artificial Intelligence, vol. 14, no. 5, pp. 771-780, 1999.
-
(1999)
J. Japanese Soc. for Artificial Intelligence
, vol.14
, Issue.5
, pp. 771-780
-
-
Freund, Y.1
Schapire, R.2
-
17
-
-
0031140246
-
How to use expert advice
-
N. Cesa-Bianchi, Y. Freund, D. Haussler, D.P. Helmbold, R.E. Schapire, and M.K. Warmuth, "How to Use Expert Advice," J. Assoc. for Computing Machinery, vol. 44, no. 3, pp. 427-485, May 1997. (Pubitemid 127634586)
-
(1997)
Journal of the ACM
, vol.44
, Issue.3
, pp. 427-485
-
-
Cesa-Bianchi, N.1
Freund, Y.2
Haussler, D.3
Helmbold, D.P.4
Schapire, R.E.5
Warmuth, M.K.6
-
18
-
-
0027274446
-
How to use expert advice
-
N. Cesa-Bianchi, Y. Freund, D.P. Helmbold, D. Haussler, R.E. Schapire, and M.K. Warmuth, "How to Use Expert Advice," Proc. 25th Ann. ACM Symp. Theory of Computing, pp. 382-391, 1993. (Pubitemid 23668758)
-
(1993)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 382-391
-
-
Cesa-Bianchi Nicolo1
Freund Yoav2
Helmbold David, P.3
Haussler David4
Schapire Robert, E.5
Warmuth Manfred, K.6
-
19
-
-
34547239511
-
A scalable approach to attack graph generation
-
DOI 10.1145/1180405.1180446, 1180446, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
X. Ou, W.F. Boyer, and M.A. McQueen, "A Scalable Approach to Attack Graph Generation," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 336-345, 2006. (Pubitemid 47131381)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 336-345
-
-
Ou, X.1
Boyer, W.F.2
McQueen, M.A.3
-
20
-
-
0032137328
-
Tracking the best expert
-
DOI 10.1023/A:1007424614876
-
M. Herbster and M.K. Warmuth, "Tracking the Best Expert," Machine Learning, vol. 32, no. 2, pp. 151-178, 1998. (Pubitemid 40626079)
-
(1998)
Machine Learning
, vol.32
, Issue.2
, pp. 151-178
-
-
Herbster, M.1
Warmuth, M.K.2
-
22
-
-
0344792106
-
Managing online security risks
-
June 1
-
H.R. Varian, "Managing Online Security Risks," New York Times, June 1 2000.
-
(2000)
New York Times
-
-
Varian, H.R.1
-
23
-
-
33750703619
-
Network software security and user incentives
-
DOI 10.1287/mnsc.1060.0568
-
T. August and T.I. Tunca, "Network Software Security and User Incentives," Management Science, vol. 52, no. 11, pp. 1703-1720, 2006. (Pubitemid 44706077)
-
(2006)
Management Science
, vol.52
, Issue.11
, pp. 1703-1720
-
-
August, T.1
Tunca, T.I.2
-
24
-
-
84990029315
-
The economics of information security investment
-
L.A. Gordon and M.P. Loeb, "The Economics of Information Security Investment," ACM Trans. Information and System Security, vol. 5, no. 4, pp. 438-457, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
25
-
-
33846138611
-
Returns to information security investment: The effect of alternative information security breach functions on optimal investment and sensitivity to vulnerability
-
DOI 10.1007/s10796-006-9011-6, Economic aspects of Information Security
-
K. Hausken, "Returns to Information Security Investment: The Effect of Alternative Information Security Breach Functions on Optimal Investment and Sensitivity to Vulnerability," Information Systems Frontiers, vol. 8, no. 5, pp. 338-349, 2006. (Pubitemid 46088508)
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 338-349
-
-
Hausken, K.1
-
26
-
-
33750482906
-
System reliability and free riding
-
H. Varian, "System Reliability and Free Riding," Economics of Information Security, vol. 12, pp. 1-16, 2001.
-
(2001)
Economics of Information Security
, vol.12
, pp. 1-16
-
-
Varian, H.1
-
27
-
-
57349198694
-
Secure or insure?: A game-theoretic analysis of information security games
-
J. Grossklags, N. Christin, and J. Chuang, "Secure or Insure?: A Game-Theoretic Analysis of Information Security Games," Proc. 17th Int'l Conf. World Wide Web, pp. 209-218, 2008.
-
(2008)
Proc. 17th Int'l Conf. World Wide Web
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
28
-
-
51749097143
-
Security decision-making among interdependent organizations
-
R.A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos, "Security Decision-Making among Interdependent Organizations," Proc. 21st IEEE Computer Security Foundations Symp., pp. 66-80, 2008.
-
(2008)
Proc. 21st IEEE Computer Security Foundations Symp.
, pp. 66-80
-
-
Miura-Ko, R.A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
29
-
-
38549087035
-
SecureRank: A risk-based vulnerability management scheme for computing infrastructures
-
DOI 10.1109/ICC.2007.244, 4288915, 2007 IEEE International Conference on Communications, ICC'07
-
R. Miura-Ko and N. Bambos, "SecureRank: A Risk-Based Vulnerability Management Scheme for Computing Infrastructures," Proc. IEEE Int'l Conf. Comm., pp. 1455-1460, June 2007. (Pubitemid 351145740)
-
(2007)
IEEE International Conference on Communications
, pp. 1455-1460
-
-
Ann Miura-Ko, R.1
Bambos, N.2
-
32
-
-
66549093519
-
Decision-theoretic and game-theoretic approaches to it security investment
-
H. Cavusoglu, S. Raghunathan, and W. Yue, "Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment," J. Management Information Systems, vol. 25, no. 2, pp. 281-304, 2008.
-
(2008)
J. Management Information Systems
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.3
|