-
2
-
-
33750440197
-
The economics of information security
-
R. Anderson and T. Moore. The economics of information security. In Science, vol. 314, no. 5799, 2006.
-
(2006)
Science
, vol.314
, Issue.5799
-
-
Anderson, R.1
Moore, T.2
-
3
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
December
-
W. A. Arbaugh, W. L. Fithen, and J. McHugh. Windows of vulnerability: A case study analysis. IEEE Computer, 33(12), December 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
4
-
-
38149097274
-
Impact of vulnerability disclosure and patch availability - An empirical analysis
-
A. Arora, R. Krishnan, A. Nandkumar, R. Telang, and Y. Yang. Impact of vulnerability disclosure and patch availability - an empirical analysis. In Workshop on the Economics of Information Security (WEIS 2004), 2004.
-
(2004)
Workshop on the Economics of Information Security (WEIS 2004)
-
-
Arora, A.1
Krishnan, R.2
Nandkumar, A.3
Telang, R.4
Yang, Y.5
-
5
-
-
78249276668
-
Timing the application of security patches for optimal uptime
-
Philadelphia, PA, Nov
-
S. Beattie, S. Arnold, C. Cowan, P. Wagle, and C. Wright. Timing the application of security patches for optimal uptime. In Large Installation System Administration Conference, pages 233-242, Philadelphia, PA, Nov 2002.
-
(2002)
Large Installation System Administration Conference
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
-
7
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
Oakland, CA, May
-
D. Brumley, P. Poosankam, D. X. Song, and J. Zheng. Automatic patch-based exploit generation is possible: Techniques and implications. In IEEE Symposium on Security and Privacy, pages 143-157, Oakland, CA, May 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 143-157
-
-
Brumley, D.1
Poosankam, P.2
Song, D.X.3
Zheng, J.4
-
9
-
-
80052678930
-
Polonium : Tera-scale graph mining for malware detection
-
Mesa, AZ, April
-
D. H. P. Chau, C. Nachenberg, J. Wilhelm, A. Wright, and C. Faloutsos. Polonium : Tera-scale graph mining for malware detection. In SIAM International Conference on Data Mining (SDM), Mesa, AZ, April 2011.
-
(2011)
SIAM International Conference on Data Mining (SDM)
-
-
Chau, D.H.P.1
Nachenberg, C.2
Wilhelm, J.3
Wright, A.4
Faloutsos, C.5
-
13
-
-
84869472054
-
End-point security failures, insight gained from secunia psi scans
-
February
-
S. Frei. End-Point Security Failures, Insight gained from Secunia PSI scans. Predict Workshop, February 2011.
-
(2011)
Predict Workshop
-
-
Frei, S.1
-
14
-
-
84870640222
-
-
Google Inc. February
-
Google Inc. Pwnium: rewards for exploits, February 2012. http://blog.chromium.org/2012/02/pwnium-rewards-for-exploits.html.
-
(2012)
Pwnium: Rewards for Exploits
-
-
-
15
-
-
84870641439
-
Shopping for zero-days: A price list for hackers' secret software exploits
-
23 March
-
A. Greenberg. Shopping for zero-days: A price list for hackers' secret software exploits. Forbes, 23 March 2012. http://www.forbes.com/sites/ andygreenberg/2012/03/23/shopping-for-zero-days-an-\price-list-for-hackers- secret-software-exploits/.
-
(2012)
Forbes
-
-
Greenberg, A.1
-
17
-
-
84870643111
-
RSA spearphish attack may have hit US defense organizations
-
8 September
-
R. McMillan. RSA spearphish attack may have hit US defense organizations. PC World, 8 September 2011. http://www.pcworld.com/businesscenter/article/ 239728/rsa-spearphish-attack-may-have-hit-us-defense-organizations.html.
-
(2011)
PC World
-
-
McMillan, R.1
-
19
-
-
84870650988
-
-
Microsoft. Microsoft security bulletins. http:// technet.microsoft.com/ en-us/security/bulletin, 2012.
-
(2012)
Microsoft Security Bulletins
-
-
-
20
-
-
84869472047
-
The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales
-
Pittsburgh, PA, June
-
C. Miller. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. In Workshop on the Economics of Information Security, Pittsburgh, PA, June 2007.
-
(2007)
Workshop on the Economics of Information Security
-
-
Miller, C.1
-
25
-
-
79958736290
-
Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE)
-
Salzburg, Austria, Apr
-
T. Dumitraş and D. Shou. Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In EuroSys BADGERS Workshop, Salzburg, Austria, Apr 2011.
-
(2011)
EuroSys BADGERS Workshop
-
-
Dumitraş, T.1
Shou, D.2
-
27
-
-
80955154992
-
-
1 April. Retrieved on 19 April 2012
-
U. Rivner. Anatomy of an attack, 1 April 2011. http: //blogs.rsa.com/ rivner/anatomy-of-an-attack/ Retrieved on 19 April 2012.
-
(2011)
Anatomy of An Attack
-
-
Rivner, U.1
-
31
-
-
19944429098
-
The nonsecurity of secrecy
-
B. Schneier. The nonsecurity of secrecy. In Commun. ACM, 2004.
-
(2004)
Commun. ACM
-
-
Schneier, B.1
-
33
-
-
84870628356
-
-
April
-
Symantec Corporation. Symantec global Internet security threat report, volume 13. http://eval.symantec.com/mktginfo/enterprise/ white-papers/b- whitepaper-internet-security- threat-report-xiii-04-2008.en-us.pdf, April 2008.
-
(2008)
Symantec Global Internet Security Threat Report
, vol.13
-
-
-
34
-
-
84870628431
-
-
April
-
Symantec Corporation. Symantec global Internet security threat report, volume 14. http://eval.symantec.com/mktginfo/enterprise/white-papers/b- whitepaper-internet-security-threat-report-xv-04-2010.en-us.pdf,April2009.
-
(2009)
Symantec Global Internet Security Threat Report
, vol.14
-
-
-
35
-
-
84870645513
-
-
April
-
Symantec Corporation. Symantec global Internet security threat report, volume 15. http://msisac.cisecurity.org/resources/reports/documents/ SymantecInternetSecurityThreatReport2010.pdf, April 2010.
-
(2010)
Symantec Global Internet Security Threat Report
, vol.15
-
-
-
38
-
-
84870649588
-
-
Symantec Corporation. Symantec threat explorer. http://www.symantec.com/ security-response/threatexplorer/azlisting.jsp, 2012.
-
(2012)
Symantec Threat Explorer
-
-
-
39
-
-
84870643100
-
-
Symantec.cloud
-
Symantec.cloud. February 2011 intelligence report. http://www. messagelabs.com/mlireport/MLI-2011-02-February-FINAL-en.PDF, 2011.
-
(2011)
February 2011 Intelligence Report
-
-
-
40
-
-
14944365100
-
Reflections on Witty: Analyzing the attacker
-
June
-
N. Weaver and D. Ellis. Reflections on Witty: Analyzing the attacker. ;login: The USENIX Magazine, 29(3):34-37, June 2004.
-
(2004)
Login: The USENIX Magazine
, vol.29
, Issue.3
, pp. 34-37
-
-
Weaver, N.1
Ellis, D.2
|