-
1
-
-
3042720722
-
Information security: Why the future belongs to the quants
-
Daniel Geer, Kevin Soo Hoo, and Andrew Jaquith. Information security: Why the future belongs to the quants. IEEE Security and Privacy, 1(4):24-32, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 24-32
-
-
Geer, D.1
Hoo, K.S.2
Jaquith, A.3
-
2
-
-
33644693734
-
Return on security investment (ROSI) - A practical quantitative model
-
February
-
Wes Sonnenreich, Jason Albanese, and Bruce Stout. Return On Security Investment (ROSI) - A practical quantitative model. Journal of Research and Practice in Information Technology, 38(1):55-66, February 2006.
-
(2006)
Journal of Research and Practice in Information Technology
, vol.38
, Issue.1
, pp. 55-66
-
-
Sonnenreich, W.1
Albanese, J.2
Stout, B.3
-
3
-
-
26444456918
-
Potential impacts of a growing gap between theory and practice in information security
-
in LNCS 3524, Springer
-
Yvo Desmedt. Potential impacts of a growing gap between theory and practice in information security. In Information Security and Privacy: 10th Australasian Conference, ACISP 2005, LNCS 3524, pages 532-536. Springer, 2005.
-
(2005)
Information Security and Privacy: 10th Australasian Conference, ACISP 2005
, pp. 532-536
-
-
Desmedt, Y.1
-
5
-
-
0004269078
-
-
US Government Printing Office, January. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission
-
W.E. Vesely, F.F. Goldberg, N.H. Roberts, and D.F. Haasl. Fault Tree Handbook. US Government Printing Office, January 1981. Systems and Reliability Research, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission.
-
(1981)
Fault Tree Handbook.
-
-
Vesely, W.E.1
Goldberg, F.F.2
Roberts, N.H.3
Haasl, D.F.4
-
7
-
-
0038226150
-
Attack modeling for information security and survivability
-
Software Engineering Institute
-
Andrew P. Moore, Robert J. Ellison, and Richard C. Linger. Attack modeling for information security and survivability. Technical Report CMU/SEI-2001-TN-001, Software Engineering Institute, 2001.
-
(2001)
Technical Report CMU/SEI-2001-TN-001
-
-
Moore, A.P.1
Ellison, R.J.2
Linger, R.C.3
-
8
-
-
0002670359
-
Attack trees: Modeling security threats
-
December
-
Bruce Schneier. Attack trees: Modeling security threats. Dr. Dobb's Journal, 24(12):21-29, December 1999.
-
(1999)
Dr. Dobb's Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
10
-
-
33745849657
-
Foundations of attack trees
-
In Dongho Won and Seungjoo Kim, editors, LNCS 3935, Springer, December. In print
-
Sjouke Mauw and Martijn Oostdijk. Foundations of attack trees. In Dongho Won and Seungjoo Kim, editors, International Conference on Information Security and Cryptology - ICISC 2005, LNCS 3935, pages 186-198. Springer, December 2005. In print.
-
(2005)
International Conference on Information Security and Cryptology - ICISC 2005
, pp. 186-198
-
-
Mauw, S.1
Oostdijk, M.2
-
11
-
-
33745867657
-
Design and implementation of a support tool for attack trees
-
Alexander Opel, Otto-von-Guericke University, March. Internship Thesis
-
Alexander Opel. Design and implementation of a support tool for attack trees. Technical report, Otto-von-Guericke University, March 2005. Internship Thesis.
-
(2005)
Technical Report
-
-
-
12
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives and strategies
-
Peng Liu, Wanyu Zang, and Meng Yu. Incentive-Based Modeling and Inference of Attacker Intent, Objectives and Strategies. ACM Transactions on Information and Systems Security, 8(1):78-118, 2005.
-
(2005)
ACM Transactions on Information and Systems Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
14
-
-
84885717978
-
-
2004 E-Crime Watch Survey. Conducted by CSO magazine in cooperation with the U.S. Secret Service & CERT Coordination Center
-
-2004 E-Crime Watch Survey. Summary of Findings. Conducted by CSO magazine in cooperation with the U.S. Secret Service & CERT Coordination Center. Available at http://www.cert.org/archive/pdf/2004eCrimeWatchSummary.pdf, 2004.
-
(2004)
Summary of Findings.
-
-
-
15
-
-
84860846663
-
The role of attack simulation in automating security risk management
-
Gidi Cohen. The role of attack simulation in automating security risk management. Information Systems Control Journal, 1:51-54, 2005.
-
(2005)
Information Systems Control Journal
, vol.1
, pp. 51-54
-
-
Cohen, G.1
|