-
2
-
-
79959986371
-
Security economics and European policy
-
WEIS. Hanover, NH, USA, June
-
Anderson, R.; Böhme, R.; Clayton, R.; Moore, T. (2008). Security economics and European policy. In Proc. of the seventh workshop on the economics of information security. WEIS. Hanover, NH, USA, June.
-
(2008)
Proc. of the Seventh Workshop on the Economics of Information Security
-
-
Anderson, R.1
Böhme, R.2
Clayton, R.3
Moore, T.4
-
4
-
-
62949107154
-
Special issue on technology of networked control systems
-
P. Antsaklis, and J. Baillieul Special issue on technology of networked control systems Proceedings of the IEEE 95 1 2007 5 8
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 5-8
-
-
Antsaklis, P.1
Baillieul, J.2
-
5
-
-
34547641190
-
Choosing what to protect: Strategic defensive allocation against an unknown attacker
-
V. Bier, S. Oliveros, and L. Samuelson Choosing what to protect: strategic defensive allocation against an unknown attacker Journal of Public Economic Theory 9 4 2007 563 587
-
(2007)
Journal of Public Economic Theory
, vol.9
, Issue.4
, pp. 563-587
-
-
Bier, V.1
Oliveros, S.2
Samuelson, L.3
-
6
-
-
79959243929
-
Modeling cyber-insurance: Towards a unifying framework
-
WEIS. Cambridge, MA, USA, June
-
Böhme, R.; Schwartz, G. A. (2010). Modeling cyber-insurance: towards a unifying framework. In Proc. of the ninth workshop on the economics of information security. WEIS. Cambridge, MA, USA, June.
-
(2010)
Proc. of the Ninth Workshop on the Economics of Information Security
-
-
Böhme, R.1
Schwartz, G.A.2
-
7
-
-
85084140752
-
Research challenges for the security of control systems
-
HotSec. San Jose, CA, USA
-
Cárdenas, A. A.; Amin, S.; Sastry, S. S. (2008). Research challenges for the security of control systems. In Proc. of the 3rd USENIX workshop on hot topics in security. HotSec. San Jose, CA, USA.
-
(2008)
Proc. of the 3rd USENIX Workshop on Hot Topics in Security
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.S.3
-
8
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
H. Cavusoglu, B. Mishra, and S. Raghunathan The value of intrusion detection systems in information technology security architecture Information Systems Research 16 1 2005 28 46
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
9
-
-
68949173803
-
Data transmission over networks for estimation and control
-
V. Gupta, A.F. Dana, J.P. Hespanha, R.M. Murray, and B. Hassibi Data transmission over networks for estimation and control IEEE Transactions on Automatic Control 54 8 2009 1807 1819
-
(2009)
IEEE Transactions on Automatic Control
, vol.54
, Issue.8
, pp. 1807-1819
-
-
Gupta, V.1
Dana, A.F.2
Hespanha, J.P.3
Murray, R.M.4
Hassibi, B.5
-
12
-
-
64149124758
-
A survey of recent results in networked control systems
-
J.P. Hespanha, P. Naghshtabrizi, and Y. Xu A survey of recent results in networked control systems Proceedings of the IEEE 95 1 2007 138 162
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.1
, pp. 138-162
-
-
Hespanha, J.P.1
Naghshtabrizi, P.2
Xu, Y.3
-
13
-
-
34547524797
-
Internalizing externalities of loss prevention through insurance monopoly: An analysis of interdependent risks
-
A. Hofmann Internalizing externalities of loss prevention through insurance monopoly: an analysis of interdependent risks The Geneva Risk and Insurance Review 32 1 2007 91 111
-
(2007)
The Geneva Risk and Insurance Review
, vol.32
, Issue.1
, pp. 91-111
-
-
Hofmann, A.1
-
14
-
-
84944232084
-
Interdependence of reliability and security
-
WEIS. Pittsburgh, PA, USA, June
-
Honeyman, P.; Schwartz, G. A.; Van Assche, A. (2007). Interdependence of reliability and security. In Proc. of the 6th workshop on economics of information security. WEIS. Pittsburgh, PA, USA, June.
-
(2007)
Proc. of the 6th Workshop on Economics of Information Security
-
-
Honeyman, P.1
Schwartz, G.A.2
Van Assche, A.3
-
15
-
-
33746037180
-
Optimal control of LTI systems over unreliable communication links
-
O.C. Imer, S. Yüksel, and T. Başar Optimal control of LTI systems over unreliable communication links Automatica 42 9 2006 1429 1439
-
(2006)
Automatica
, vol.42
, Issue.9
, pp. 1429-1439
-
-
Imer, O.C.1
Yüksel, S.2
Başar, T.3
-
16
-
-
79957616447
-
Stuxnet: Dissecting a cyberwarfare weapon
-
R. Langner Stuxnet: dissecting a cyberwarfare weapon IEEE Security and Privacy 9 3 2011 49 51
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 49-51
-
-
Langner, R.1
-
17
-
-
77949590093
-
Economics of malware: Epidemic risks model, network externalities and incentives
-
IEEE Press Piscataway, NJ, USA
-
M. Lelarge Economics of malware: epidemic risks model, network externalities and incentives Proc. of the 47th annual allerton conference on communication, control, and computing 2009 IEEE Press Piscataway, NJ, USA 1353 1360
-
(2009)
Proc. of the 47th Annual Allerton Conference on Communication, Control, and Computing
, pp. 1353-1360
-
-
Lelarge, M.1
-
18
-
-
57349135233
-
Network externalities and the deployment of security features and protocols in the Internet
-
M. Lelarge, and J. Bolot Network externalities and the deployment of security features and protocols in the Internet SIGMETRICS Performance Evaluation Review 36 1 2008 37 48
-
(2008)
SIGMETRICS Performance Evaluation Review
, vol.36
, Issue.1
, pp. 37-48
-
-
Lelarge, M.1
Bolot, J.2
-
19
-
-
64549128286
-
Security investment games of interdependent organizations
-
September
-
Miura-Ko, R. A.; Yolken, B.; Bambos, N.; Mitchell, J. (2008a). Security investment games of interdependent organizations. In Proc. of the 46th annual allerton conference on communication, control, and computing. September (pp. 252-260).
-
(2008)
Proc. of the 46th Annual Allerton Conference on Communication, Control, and Computing
, pp. 252-260
-
-
Miura-Ko, R.A.1
Yolken, B.2
Bambos, N.3
Mitchell, J.4
-
20
-
-
51749097143
-
Security decision-making among interdependent organizations
-
IEEE Computer Society Washington, DC, USA
-
R.A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos Security decision-making among interdependent organizations Proceedings of the 21st IEEE computer security foundations symposium 2008 IEEE Computer Society Washington, DC, USA 66 80
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium
, pp. 66-80
-
-
Miura-Ko, R.A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
22
-
-
84988815150
-
Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities
-
National Research Council. Philadelphia
-
Owens, W. A.; Dam, K. W.; Lin, H. S. (2009). Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. Committee on Offensive Information Warfare. National Research Council. Philadelphia.
-
(2009)
Committee on Offensive Information Warfare
-
-
Owens, W.A.1
Dam, K.W.2
Lin, H.S.3
-
23
-
-
64149120662
-
Foundations of control and estimation over lossy networks
-
L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S.S. Sastry Foundations of control and estimation over lossy networks Proceedings of the IEEE 95 2007 163 187
-
(2007)
Proceedings of the IEEE
, vol.95
, pp. 163-187
-
-
Schenato, L.1
Sinopoli, B.2
Franceschetti, M.3
Poolla, K.4
Sastry, S.S.5
-
24
-
-
33750482906
-
System reliability and free riding
-
Kluwer Academic Publishers
-
H.R. Varian System reliability and free riding Economics of information security 2004 Kluwer Academic Publishers 1 15
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.R.1
|