-
1
-
-
0033539175
-
Diameter of the world-wide web
-
R. Albert, H. Jeong, and A.L. Barabási Diameter of the world-wide web Nature 401 1999 130 131
-
(1999)
Nature
, vol.401
, pp. 130-131
-
-
Albert, R.1
Jeong, H.2
Barabási, A.L.3
-
2
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.L. Barabási Error and attack tolerance of complex networks Nature 406 2000 378 382
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.L.3
-
3
-
-
29844458140
-
Understanding Internet topology: Principles, models, and validation
-
D. Alderson, L. Li, W. Wallinger, and J.C. Doyle Understanding Internet topology: principles, models, and validation IEEE/ACM Transactions on Networking 13 6 2005 1205 1218
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1205-1218
-
-
Alderson, D.1
Li, L.2
Wallinger, W.3
Doyle, J.C.4
-
4
-
-
33748597348
-
A general, but readily adaptable model of information system risk
-
S. Alter, and S. Sherer A general, but readily adaptable model of information system risk Communications of the AIS 14 1 2004 1 28
-
(2004)
Communications of the AIS
, vol.14
, Issue.1
, pp. 1-28
-
-
Alter, S.1
Sherer, S.2
-
5
-
-
33750440197
-
The economics of information security
-
R. Anderson, and T. Moore The economics of information security Science 314 2006 610 613
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
6
-
-
12844261665
-
Measuring the risk-based value of IT security solutions
-
A. Arora, D. Hall, C.A. Pinto, D. Ramsey, and R. Telang Measuring the risk-based value of IT security solutions IEEE IT Professional 6 6 2004 35 42
-
(2004)
IEEE IT Professional
, vol.6
, Issue.6
, pp. 35-42
-
-
Arora, A.1
Hall, D.2
Pinto, C.A.3
Ramsey, D.4
Telang, R.5
-
7
-
-
0038483826
-
Emergence of scaling in random networks
-
A.L. Barabási, and R. Albert Emergence of scaling in random networks Science 286 1999 509 512
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.L.1
Albert, R.2
-
8
-
-
84869494686
-
Process-Centric Risk Management Framework for Information Security
-
H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, Elsevier The Netherlands
-
R.S. Behara, and S. Bhattacharya Process-Centric Risk Management Framework for Information Security H. Chen, T.S. Raghu, R. Ramesh, A. Vinze, D. Zeng, National Security 349-366 2007 Elsevier The Netherlands
-
(2007)
National Security
, vol.349-366
-
-
Behara, R.S.1
Bhattacharya, S.2
-
9
-
-
33748605277
-
Computer security: An end state?
-
S. Bellovin Computer security: an end state? Communications of ACM 44 3 2001 131 132
-
(2001)
Communications of ACM
, vol.44
, Issue.3
, pp. 131-132
-
-
Bellovin, S.1
-
10
-
-
1642413541
-
It doesn't matter
-
N.G. Carr It doesn't matter Harvard Business Review 81 5 2003 41 49
-
(2003)
Harvard Business Review
, vol.81
, Issue.5
, pp. 41-49
-
-
Carr, N.G.1
-
11
-
-
0037387448
-
Determining Intent - Opportunistic vs. Targeted Attacks
-
E. Casey Determining Intent - Opportunistic vs. Targeted Attacks Computer Fraud & Security 4 2003 8 11
-
(2003)
Computer Fraud & Security
, vol.4
, pp. 8-11
-
-
Casey, E.1
-
12
-
-
34548502174
-
Configuration of intrusion detection systems: A comparison of decision and game theoretic approaches
-
H. Cavusoglu, and S. Raghunathan Configuration of intrusion detection systems: a comparison of decision and game theoretic approaches INFORMS Journal of Decision Analysis 1 3 2004 131 148
-
(2004)
INFORMS Journal of Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
14
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
15
-
-
19944417270
-
Infection dynamics on the internet
-
D.B. Chang, and C.S. Young Infection dynamics on the internet Computer Security 24 2005 280 286
-
(2005)
Computer Security
, vol.24
, pp. 280-286
-
-
Chang, D.B.1
Young, C.S.2
-
17
-
-
84909999858
-
Understanding and influencing attackers' decisions: Implications for security investment strategies
-
Cambridge, England
-
Cremonini, D.; Nizovtsev, M.; 2006. Understanding and influencing attackers' decisions: implications for security investment strategies. In: Fifth Workshop on Economics of Information Security, Cambridge, England.
-
(2006)
Fifth Workshop on Economics of Information Security
-
-
Cremonini, D.1
Nizovtsev, M.2
-
21
-
-
49249136823
-
Can business process reengineering lead to security vulnerability: Analyzing the reengineered process
-
S. Goel, and V. Chen Can business process reengineering lead to security vulnerability: analyzing the reengineered process International Journal of Production Economics 115 1 2008 104 112
-
(2008)
International Journal of Production Economics
, vol.115
, Issue.1
, pp. 104-112
-
-
Goel, S.1
Chen, V.2
-
23
-
-
31844435712
-
A note on the spread of worms in scale-free networks
-
C. Griffin, and R. Brooks A note on the spread of worms in scale-free networks IEEE Transactions on Systems, Man, Cybernetics B 36 1 2006 198 202
-
(2006)
IEEE Transactions on Systems, Man, Cybernetics B
, vol.36
, Issue.1
, pp. 198-202
-
-
Griffin, C.1
Brooks, R.2
-
25
-
-
33846138611
-
Returns to information security investment: The effect of alternative information security breach functions on optima investment and sensitivity to vulnerability
-
K. Hauske Returns to information security investment: the effect of alternative information security breach functions on optima investment and sensitivity to vulnerability Information Systems Frontier 8 2006 338 349
-
(2006)
Information Systems Frontier
, vol.8
, pp. 338-349
-
-
Hauske, K.1
-
26
-
-
70350731196
-
Preemptive learning, competency traps, and information technology adoption: A real options analysis
-
X. Li Preemptive learning, competency traps, and information technology adoption: a real options analysis IEEE Transactions on Engineering Management 56 4 2009 650 662
-
(2009)
IEEE Transactions on Engineering Management
, vol.56
, Issue.4
, pp. 650-662
-
-
Li, X.1
-
27
-
-
46849085979
-
An economic analysis of the optimal information security investment in the case of a risk-averse firm
-
C.D. Huang, R.S. Behara, and Q. Hu An economic analysis of the optimal information security investment in the case of a risk-averse firm International Journal of Production Economics 114 2 2008 793 804
-
(2008)
International Journal of Production Economics
, vol.114
, Issue.2
, pp. 793-804
-
-
Huang, C.D.1
Behara, R.S.2
Hu, Q.3
-
28
-
-
49249117338
-
Managing risk propagation in extended enterprise networks
-
C.D. Huang, R.S. Behara, and Q. Hu Managing risk propagation in extended enterprise networks IEEE IT Professional 10 4 2008 14 19
-
(2008)
IEEE IT Professional
, vol.10
, Issue.4
, pp. 14-19
-
-
Huang, C.D.1
Behara, R.S.2
Hu, Q.3
-
29
-
-
84869507743
-
The State of information security spending
-
K. Karr The State of information security spending Forrester Research 4 2006
-
(2006)
Forrester Research
, vol.4
-
-
Karr, K.1
-
30
-
-
13844275988
-
Technology competition and optimal investment timing: A real options perspective
-
Kaufman, R.; Li, X.; 2005. Technology competition and optimal investment timing: a real options perspective. IEEE Transaction on Engineering Management 52 (1), 15-29.
-
(2005)
IEEE Transaction on Engineering Management
, vol.52
, Issue.1
, pp. 15-29
-
-
Kaufman, R.1
Li, X.2
-
32
-
-
0033727040
-
The web as a graph
-
Dallas, Texas
-
Kumar, R.; Raghavan, P.; Rajagopalan, S.; Sivakumar, D.; Tomkins, A.; Upfal, E.; 2000. The web as a graph. In: Proceedings of 19th ACM Symposium of Principles of Database Systems, Dallas, Texas, 1-10.
-
(2000)
Proceedings of 19th ACM Symposium of Principles of Database Systems
, pp. 1-10
-
-
Kumar, R.1
Raghavan, P.2
Rajagopalan, S.3
Sivakumar, D.4
Tomkins, A.5
Upfal, E.6
-
33
-
-
66549103101
-
Understanding the value of countermeasure portfolios in information systems security
-
R.L. Kumar, S. Park, and C. Subramaniam Understanding the value of countermeasure portfolios in information systems security Journal of Management Information Systems 25 2 2008 241 279
-
(2008)
Journal of Management Information Systems
, vol.25
, Issue.2
, pp. 241-279
-
-
Kumar, R.L.1
Park, S.2
Subramaniam, C.3
-
35
-
-
4243150787
-
Analyzing security costs
-
R.T. Mercuri Analyzing security costs Communications of ACM 46 6 2003 15 18
-
(2003)
Communications of ACM
, vol.46
, Issue.6
, pp. 15-18
-
-
Mercuri, R.T.1
-
40
-
-
84869494682
-
What's really happening in IT security?
-
J. Poff What's really happening in IT security? InterBusiness Issues 2009
-
(2009)
InterBusiness Issues
-
-
Poff, J.1
-
43
-
-
14744281156
-
Towards econometric models of the security risk from remote attacks
-
S.E. Schechter Towards econometric models of the security risk from remote attacks IEEE Security & Privacy 3 1 2005 40 44
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 40-44
-
-
Schechter, S.E.1
-
47
-
-
0037133194
-
Scaling phenomena in the internet: Critically examining criticality
-
W. Wallinger, R. Govindan, S. Jamin, V. Paxson, and S. Shenker Scaling phenomena in the internet: critically examining criticality Proceedings of National Academy of Science 99 1 2000 2573 2580
-
(2000)
Proceedings of National Academy of Science
, vol.99
, Issue.1
, pp. 2573-2580
-
-
Wallinger, W.1
Govindan, R.2
Jamin, S.3
Paxson, V.4
Shenker, S.5
-
49
-
-
0032482432
-
Collective dynamics of small-world
-
D.J. Watts, and S.H. Strogatz Collective dynamics of small-world Networks, Nature 393 1998 440 442
-
(1998)
Networks, Nature
, vol.393
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
50
-
-
33751017682
-
Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity
-
T. Zhou, J.G. Liu, W.J. Bai, G. Chen, and B.H. Wang Behavior of susceptible-infected epidemics on scale-free networks with identical infectivity Physical Reviews E 74 5 2006 0561091
-
(2006)
Physical Reviews e
, vol.74
, Issue.5
, pp. 0561091
-
-
Zhou, T.1
Liu, J.G.2
Bai, W.J.3
Chen, G.4
Wang, B.H.5
|