-
1
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Arbaugh, W., W. Fithen, J. McHugh. 2000. Windows of vulnerability: A case study analysis. Computer 33(3) 52-59.
-
(2000)
Computer
, vol.33
, Issue.3
, pp. 52-59
-
-
Arbaugh, W.1
Fithen, W.2
McHugh, J.3
-
2
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
Arora, A., R. Telang, H. Xu. 2008. Optimal policy for software vulnerability disclosure. Management Sci. 54(4) 642-656.
-
(2008)
Management Sci
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
3
-
-
67649964750
-
Maintaining diagnositic knowledge-based systems, a control theoretic approach
-
Bensoussan, A., R. Mookerjee, V. Mookerjee, W. Yue. 2009. Maintaining diagnositic knowledge-based systems, a control theoretic approach. Management Sci. 55(2) 294-310.
-
(2009)
Management Sci
, vol.55
, Issue.2
, pp. 294-310
-
-
Bensoussan, A.1
Mookerjee, R.2
Mookerjee, V.3
Yue, W.4
-
5
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
Cavusoglu, H., S. Raghunathan, H. Cavusoglu. 2009. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Inform. Systems Res. 20(2) 198-217.
-
(2009)
Inform. Systems Res
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
7
-
-
33744996371
-
Moving beyond compliance. Ernst & Young's 2008 global information security survey
-
Technical report. Ernst & Young
-
Ernst & Young. 2008. Moving beyond compliance. Ernst & Young's 2008 global information security survey. Technical report. Ernst & Young. http://www.ey.com/Global/assets.nsf/ International/TSRS_Global_Information_Security_Survey_2008/ $file/TSRS_Global_Information_Security_Survey_2008.pdf.
-
(2008)
-
-
Ernst1
Young2
-
8
-
-
52049095294
-
Hacking for dollars
-
CNET News
-
Evers, J. 2005. Hacking for dollars. CNET News. http://news .cnet.com/Hacking-for-dollars/2100-7349_3-5772238.html
-
(2005)
-
-
Evers, J.1
-
9
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
Gordon, L. A., M. P. Loeb, W. Lucyshyn. 2003. Sharing information on computer systems security: An economic analysis. J. Accounting Public Policy 22 461-485.
-
(2003)
J. Accounting Public Policy
, vol.22
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
10
-
-
34547981657
-
Using attack graphs to design systems
-
Gupta, S., J. Winstead. 2007. Using attack graphs to design systems. IEEE Security Privacy 5(4) 80-83.
-
(2007)
IEEE Security Privacy
, vol.5
, Issue.4
, pp. 80-83
-
-
Gupta, S.1
Winstead, J.2
-
11
-
-
84876694249
-
Imprivata PCI data security standard. Imprivata
-
Imprivata. 2007. PCI data security standard. Imprivata. http:// www.computerworld.com/pdfs/Imprivita_A_Pathway_to _PCI_Compliance.pdf.
-
(2007)
-
-
-
13
-
-
0042855099
-
A sociology of hackers
-
Jordan, T., P. Taylor. 1998. A sociology of hackers. Sociol. Rev. 46(4) 757-780.
-
(1998)
Sociol. Rev
, vol.46
, Issue.4
, pp. 757-780
-
-
Jordan, T.1
Taylor, P.2
-
14
-
-
84940104123
-
A data mining framework for building intrusion detection models. IEEE Sympos. Security and Privacy 01-20
-
Oakland, CA
-
Lee, W., S. Stolfo, K. Mok. 1999. A data mining framework for building intrusion detection models. IEEE Sympos. Security and Privacy 01-20. IEEE Conference Proceedings, Oakland, CA.
-
(1999)
IEEE Conference Proceedings
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
16
-
-
0003795084
-
-
McGraw-Hill, Emeryville, CA
-
McClure, S., J. Scambray, G. Kurtz. 2005. Hacking Exposed: Network Security Secrets and Solutions. McGraw-Hill, Emeryville, CA.
-
(2005)
Hacking Exposed: Network Security Secrets and Solutions
-
-
McClure, S.1
Scambray, J.2
Kurtz, G.3
-
18
-
-
42449117164
-
Guide to intrusion detection and prevention systems (idps)
-
Special Publication 800-30, National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce
-
Scarfone, K., P. Mell. 2007. Guide to intrusion detection and prevention systems (idps). Special Publication 800-30, National Institute of Standards and Technology (NIST), Technology Administration, U.S. Department of Commerce, http:// csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf.
-
(2007)
-
-
Scarfone, K.1
Mell, P.2
-
19
-
-
33646430608
-
Converting website visitors into buyers: How website investment increases consumer trusting beliefs and online purchase intentions
-
Schlosser, A. E., T. B. White, S. M. Lloyd. 2006. Converting website visitors into buyers: How website investment increases consumer trusting beliefs and online purchase intentions. J. Marketing 70 133-148.
-
(2006)
J. Marketing
, vol.70
, pp. 133-148
-
-
Schlosser, A.E.1
White, T.B.2
Lloyd, S.M.3
-
20
-
-
85041845600
-
Sophos security threat report 2008
-
Sophos Technical report
-
Sophos. 2008. Sophos security threat report 2008. Technical report. http://www.rsaconference.com/uploadedFiles/RSA365/Security_Topics/Hackers_and_Threats/White_Papers/Sophos/sophos-security-report-08.pdf.
-
(2008)
-
-
-
21
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila, J., J. Gaffney, Jr. 2004. A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1) 35-50.
-
(2004)
Decision Anal
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.1
Gaffney Jr., J.2
-
22
-
-
84876677542
-
-
United States Government Accountability Office (U.S.Govt.) Personal information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. Technical report
-
United States Government Accountability Office (U.S. Govt.). 2007. Personal information: Data breaches are frequent, but evidence of resulting identity theft is limited; however, the full extent is unknown. Technical report, http://www .gao.gov/new.items/d07737.pdf.
-
(2007)
-
-
-
23
-
-
38349147070
-
Intrusion prevention in information systems: Reactive and proactive response
-
Yue, W., M. Cakanyildirim. 2007. Intrusion prevention in information systems: Reactive and proactive response. J. Management Inform. Systems 24(1) 329-353.
-
(2007)
J. Management Inform. Systems
, vol.24
, Issue.1
, pp. 329-353
-
-
Yue, W.1
Cakanyildirim, M.2
-
24
-
-
20344381078
-
Black market in stolen credit card data thrives on Internet
-
Zeller, T. 2005. Black market in stolen credit card data thrives on Internet. New York Times. http://www.nytimes.com/2005/06/ 21/technology/21data.html.
-
(2005)
New York Times
-
-
Zeller, T.1
|