-
1
-
-
84863546074
-
Annual threat assessment of the intelligence community for the Senate Select Committee on Intelligence
-
Washington, DC
-
Blair, D. C. (2009). Annual threat assessment of the intelligence community for the Senate Select Committee on Intelligence. Office of the Director of National Intelligence, Washington, DC
-
(2009)
Office of the Director of National Intelligence
-
-
Blair, D.C.1
-
2
-
-
0347567117
-
A framework to quantitatively assess and enhance the seismic resilience of communities
-
Bruneau, M., Chang, S. E., Eguchi, R. T., Lee, G. C., O'Rourke, T. D., Reinhorn, A. M., et al. (2003). A framework to quantitatively assess and enhance the seismic resilience of communities. Earthquake Spectra, 19(4), 733-752.
-
(2003)
Earthquake Spectra
, vol.19
, Issue.4
, pp. 733-752
-
-
Bruneau, M.1
Chang, S.E.2
Eguchi, R.T.3
Lee, G.C.4
O'Rourke, T.D.5
Reinhorn, A.M.6
-
3
-
-
7444242205
-
The effect of internet security breach announcements on market value of breached firms and internet security developers
-
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value of breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69-105.
-
(2004)
International Journal of Electronic Commerce
, vol.9
, Issue.1
, pp. 69-105
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
4
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu, H., Mishra, B., & Raghunathan, S. (2005). The value of intrusion detection systems in information technology security architecture. Information Systems Research, 16(1), 28-46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
5
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
Cavusoglu, H., & Raghunathan, S. (2009). Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Information Systems Research, 20(2), 198-217.
-
(2009)
Information Systems Research
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
6
-
-
85045163517
-
The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions
-
Chittister, C. G., & Haimes, Y. Y. (2011). The role of modeling in the resilience of cyberinfrastructure systems and preparedness for cyber intrusions. Journal of Homeland Security and Emergency Management, 8(1), 1547-1577.
-
(2011)
Journal of Homeland Security and Emergency Management
, vol.8
, Issue.1
, pp. 1547-1577
-
-
Chittister, C.G.1
Haimes, Y.Y.2
-
7
-
-
77951650443
-
Seismic resilience of a hospital system
-
Cimellaro, G., Reinhorn, A., & Bruneau, M. (2010). Seismic resilience of a hospital system. Structure and Infrastructure Engineering, 6(1), 127-144.
-
(2010)
Structure and Infrastructure Engineering
, vol.6
, Issue.1
, pp. 127-144
-
-
Cimellaro, G.1
Reinhorn, A.2
Bruneau, M.3
-
8
-
-
84863542333
-
-
Computer Security Institute. 2009 Computer Crime & Security Survey. Retrieved from
-
Computer Security Institute. (2009). 2009 Computer Crime & Security Survey. Retrieved from
-
(2009)
-
-
-
9
-
-
34047184222
-
The severity of supply chain disruptions: Design characteristics and mitigation capabilities
-
Craighead, C. W., Blackhurst, J., Rungtusanatham, M. J., & Handfield, R. B. (2007). The severity of supply chain disruptions: Design characteristics and mitigation capabilities. Decision Sciences, 38(1), 131-156.
-
(2007)
Decision Sciences
, vol.38
, Issue.1
, pp. 131-156
-
-
Craighead, C.W.1
Blackhurst, J.2
Rungtusanatham, M.J.3
Handfield, R.B.4
-
10
-
-
56949087304
-
A place-based model for understanding community resilience to natural disasters
-
Cutter, S., Barnes, L., Berry, M., Burton, C., Evans, E., Tate, E., et al. (2008). A place-based model for understanding community resilience to natural disasters. Global Environmental Change, 18(4), 598-606.
-
(2008)
Global Environmental Change
, vol.18
, Issue.4
, pp. 598-606
-
-
Cutter, S.1
Barnes, L.2
Berry, M.3
Burton, C.4
Evans, E.5
Tate, E.6
-
11
-
-
0002000920
-
Denial-of-service attacks rip the Internet
-
Garber, L. (2000). Denial-of-service attacks rip the Internet. IEEE Computer, 33(4), 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
12
-
-
62749127251
-
On the definition of resilience in systems
-
Haimes, Y. (2009). On the definition of resilience in systems. Risk Analysis: An International Journal, 29(4), 498-501.
-
(2009)
Risk Analysis: An International Journal
, vol.29
, Issue.4
, pp. 498-501
-
-
Haimes, Y.1
-
13
-
-
34547320186
-
A knowledge architecture for IT security
-
Kesh, S., & Ratnasingam, P. (2007). A knowledge architecture for IT security. Communications of the ACM, 50(7), 103-108.
-
(2007)
Communications of the ACM
, vol.50
, Issue.7
, pp. 103-108
-
-
Kesh, S.1
Ratnasingam, P.2
-
14
-
-
70350786960
-
Quantifying the benefits of investing in information security
-
Khansa, L., & Liginlal, D. (2009a). Quantifying the benefits of investing in information security. Communications of the ACM, 52(11), 113-117.
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
, pp. 113-117
-
-
Khansa, L.1
Liginlal, D.2
-
15
-
-
50849136520
-
Valuing the flexibility of investing in security process innovations
-
Khansa, L., & Liginlal, D. (2009b). Valuing the flexibility of investing in security process innovations. European Journal of Operational Research, 192(1), 216-235.
-
(2009)
European Journal of Operational Research
, vol.192
, Issue.1
, pp. 216-235
-
-
Khansa, L.1
Liginlal, D.2
-
16
-
-
66549103101
-
Understanding the value of countermeasure portfolios in information systems security
-
Kumar, R. L., Park, S., & Subramaniam, C. (2008). Understanding the value of countermeasure portfolios in information systems security. Journal of Management Information Systems, 25(2), 241-280.
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 241-280
-
-
Kumar, R.L.1
Park, S.2
Subramaniam, C.3
-
17
-
-
78049418283
-
Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification
-
Liberatore, F., Scaparra, M. P., & Daskin, M. S. (2011). Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification. Computers & Operations Research, 38(1), 357-366.
-
(2011)
Computers & Operations Research
, vol.38
, Issue.1
, pp. 357-366
-
-
Liberatore, F.1
Scaparra, M.P.2
Daskin, M.S.3
-
18
-
-
63049132678
-
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management
-
Liginlal, D., Sim, I., & Khansa, L. (2009). How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. Computers & Security, 28(3-4), 215-228.
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 215-228
-
-
Liginlal, D.1
Sim, I.2
Khansa, L.3
-
20
-
-
44149099991
-
Fostering resilience to extreme events within infrastructure systems: Characterizing decision contexts for mitigation and adaptation
-
McDaniels, T., Chang, S. E., Cole, D., Mikawoz, J., & Longstaff, H. (2008). Fostering resilience to extreme events within infrastructure systems: Characterizing decision contexts for mitigation and adaptation. Global Environmental Change, 18(2), 310-318.
-
(2008)
Global Environmental Change
, vol.18
, Issue.2
, pp. 310-318
-
-
McDaniels, T.1
Chang, S.E.2
Cole, D.3
Mikawoz, J.4
Longstaff, H.5
-
21
-
-
0035565671
-
An improved security requirement for data perturbation with implications for E-commerce
-
Muralidhar, K., Sarathy, R., & Parsa, R. (2001). An improved security requirement for data perturbation with implications for E-commerce. Decision Sciences, 32(4), 683-698.
-
(2001)
Decision Sciences
, vol.32
, Issue.4
, pp. 683-698
-
-
Muralidhar, K.1
Sarathy, R.2
Parsa, R.3
-
22
-
-
15744376024
-
Lessons learned from the World Trade Center disaster about critical utility systems
-
In. Boulder, CO: University of Colorado, Natural Hazards Research and Applications Information Center
-
O'Rourke, T. D., Lembo, A. J., & Nozick, L. K. (2003). Lessons learned from the World Trade Center disaster about critical utility systems. InBeyond September 11th: An Account of Post-Disaster Research. Boulder, CO: University of Colorado, Natural Hazards Research and Applications Information Center, 269-290.
-
(2003)
Beyond September 11th: An Account of Post-Disaster Research
, pp. 269-290
-
-
O'Rourke, T.D.1
Lembo, A.J.2
Nozick, L.K.3
-
23
-
-
70349989256
-
Resilient control systems: Next generation design research
-
Catania, Italy: IEEE
-
Rieger, C. G., Gertman, D. I., & McQueen, M. A. (2009). Resilient control systems: Next generation design research. Proceedings of the Second Conference on Human System Interactions. Catania, Italy: IEEE, 632-636.
-
(2009)
Proceedings of the Second Conference on Human System Interactions
, pp. 632-636
-
-
Rieger, C.G.1
Gertman, D.I.2
McQueen, M.A.3
-
24
-
-
33846444005
-
Resilience of integrated power and water systems
-
In MCEER (Ed.), Buffalo, NY: MCEER
-
Shinozuka, M., Chang, S. E., Cheng, T.-C., Feng, M., O'Rourke, T. D., Saadeghvaziri, M. A., ... Shi, P. (2004). Resilience of integrated power and water systems. In MCEER (Ed.), MCEER Research Progress and Accomplishments: 2003-2004. Buffalo, NY: MCEER, 65-86.
-
(2004)
MCEER Research Progress and Accomplishments: 2003-2004
, pp. 65-86
-
-
Shinozuka, M.1
Chang, S.E.2
Cheng, T.-C.3
Feng, M.4
O'Rourke, T.D.5
Saadeghvaziri, M.A.6
Shi, P.7
-
25
-
-
0000280419
-
Effective IS security
-
Straub, D. W., & Straub, W. (1990). Effective IS security. Information Systems Research, 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
Straub, W.2
-
26
-
-
33748594201
-
An information systems security risk assessment model under the Dempster-Shafer theory of belief functions
-
Sun, L., Srivastava, R. P., & Mock, T. J. (2006). An information systems security risk assessment model under the Dempster-Shafer theory of belief functions. Journal of Management Information Systems, 22(4), 109-142.
-
(2006)
Journal of Management Information Systems
, vol.22
, Issue.4
, pp. 109-142
-
-
Sun, L.1
Srivastava, R.P.2
Mock, T.J.3
-
27
-
-
34548298059
-
Conceptualizing and measuring resilience: A key to disaster loss reduction
-
Tierney, K., & Bruneau, M. (2007). Conceptualizing and measuring resilience: A key to disaster loss reduction. TR News, 250, 14-17.
-
(2007)
TR News
, vol.250
, pp. 14-17
-
-
Tierney, K.1
Bruneau, M.2
-
28
-
-
84883157791
-
Cyber security: Threat identification, risk and vulnerability assessment
-
In A. Gheorghe, & L. Muresan (Eds.), Amsterdam, The Netherlands: Springer
-
Umberger, H., & Gheorghe, A. (2011). Cyber security: Threat identification, risk and vulnerability assessment. In A. Gheorghe, & L. Muresan (Eds.), Energy Security: International and Local Issues, Theoretical Perspectives, and Critical Energy Infrastructures. Amsterdam, The Netherlands: Springer, 247-269.
-
(2011)
Energy Security: International and Local Issues, Theoretical Perspectives, and Critical Energy Infrastructures
, pp. 247-269
-
-
Umberger, H.1
Gheorghe, A.2
-
29
-
-
61349180141
-
A value-at-risk approach to information security investment
-
Wang, J., Chaudhury, A., & Rao, H. R. (2008). A value-at-risk approach to information security investment. Information Systems Research, 19(1), 106-120.
-
(2008)
Information Systems Research
, vol.19
, Issue.1
, pp. 106-120
-
-
Wang, J.1
Chaudhury, A.2
Rao, H.R.3
-
30
-
-
79952800224
-
Avoiding performance fluctuation in cloud storage
-
Dona Paula
-
Wang, J., Varman, P., & Xie, C. (2010). Avoiding performance fluctuation in cloud storage. Proceedings of the International Conference on High Performance Computing (HiPC), Dona Paula, 1-9.
-
(2010)
Proceedings of the International Conference on High Performance Computing (HiPC)
, pp. 1-9
-
-
Wang, J.1
Varman, P.2
Xie, C.3
-
31
-
-
84863539258
-
Statement of Amit Yoran, Director, National Cyber Security Division, Department of Homeland Security. In US Senate Committee on the Judiciary. Virtual threat, real terror: Cyberterrorism in the 21st century
-
Retrieved from
-
Yoran, A. (2004). Statement of Amit Yoran, Director, National Cyber Security Division, Department of Homeland Security. In US Senate Committee on the Judiciary. Virtual threat, real terror: Cyberterrorism in the 21st century. Hearing before the Subcommittee on Terrorism, Technology and Homeland Security, 108th Congress, 2nd session, 8-18. Retrieved from
-
(2004)
Hearing before the Subcommittee on Terrorism, Technology and Homeland Security, 108th Congress, 2nd session
, pp. 8-18
-
-
Yoran, A.1
-
32
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive responses
-
Yue, W. T., & Çakanyildirim, M. (2007). Intrusion prevention in information systems: Reactive and proactive responses. Journal of Management Information Systems, 24(1), 329-353.
-
(2007)
Journal of Management Information Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.T.1
Çakanyildirim, M.2
-
33
-
-
34548477450
-
Network externalities, layered protection and IT security risk management
-
Yue, W. T., Çakanyildirim, M., Ryu, Y. U., & Liu, D. (2007). Network externalities, layered protection and IT security risk management. Decision Support Systems, 44(1), 1-16.
-
(2007)
Decision Support Systems
, vol.44
, Issue.1
, pp. 1-16
-
-
Yue, W.T.1
Çakanyildirim, M.2
Ryu, Y.U.3
Liu, D.4
-
34
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Zhou, C. V., Leckie, C., & Karunasekera, S. (2010). A survey of coordinated attacks and collaborative intrusion detection. Computers & Security, 29(1), 124-140.
-
(2010)
Computers & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
35
-
-
38549098290
-
Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort
-
Zhuang, J., & Bier, V. M. (2007). Balancing terrorism and natural disasters defensive strategy with endogenous attacker effort. Operations Research, 55(5), 976-991.
-
(2007)
Operations Research
, vol.55
, Issue.5
, pp. 976-991
-
-
Zhuang, J.1
Bier, V.M.2
-
36
-
-
84905668734
-
Comparative visualization of predicted disaster resilience
-
Seattle, WA: ISCRAM
-
Zobel, C. W. (2010). Comparative visualization of predicted disaster resilience. Proceedings of the 7th International ISCRAM Conference. Seattle, WA: ISCRAM, 1-5.
-
(2010)
Proceedings of the 7th International ISCRAM Conference
, pp. 1-5
-
-
Zobel, C.W.1
-
37
-
-
78650171177
-
Representing perceived tradeoffs in defining disaster resilience
-
Zobel, C. W. (2011). Representing perceived tradeoffs in defining disaster resilience. Decision Support Systems, 50(2), 394-403.
-
(2011)
Decision Support Systems
, vol.50
, Issue.2
, pp. 394-403
-
-
Zobel, C.W.1
|