-
1
-
-
84928457660
-
Offensive versus defensive: Military strategy and alternative defence
-
10.1177/002234338702400107
-
Agrell W. (1987) Offensive versus defensive: Military strategy and alternative defence. Journal of Peace Research 24(1): 75-85
-
(1987)
Journal of Peace Research
, vol.24
, Issue.1
, pp. 75-85
-
-
Agrell, W.1
-
3
-
-
44849144759
-
Enterprise information security strategies
-
10.1016/j.cose.2008.03.002
-
Anderson E. E., Choobineha J. (2008) Enterprise information security strategies. Computers Security 27: 22-29
-
(2008)
Computers Security
, vol.27
, pp. 22-29
-
-
Anderson, E.E.1
Choobineha, J.2
-
5
-
-
84896401848
-
An exploration of cyberspace security RD investment strategies for DARPA: The day after. in cyberspace
-
Anderson, R. H.; Hearn, A. C. (1996). An exploration of cyberspace security RD investment strategies for DARPA: 'The day after. in cyberspace'. RAND.
-
(1996)
RAND
-
-
Anderson, R.H.1
Hearn, A.C.2
-
6
-
-
32444441216
-
Why attacking systems is a good idea
-
10.1109/MSP.2004.46
-
Arce I., McGraw G. (2004) Why attacking systems is a good idea. IEEE Security Privacy 2(4): 17-19
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.4
, pp. 17-19
-
-
Arce, I.1
McGraw, G.2
-
7
-
-
2142808457
-
Autonomic defense: Thwarting automated attacks via real-time feedback control
-
10.1002/cplx.20011
-
Armstrong D., Carter S., Frazier G., Frazier T. (2004) Autonomic defense: Thwarting automated attacks via real-time feedback control. Complexity 9(2): 41-48
-
(2004)
Complexity
, vol.9
, Issue.2
, pp. 41-48
-
-
Armstrong, D.1
Carter, S.2
Frazier, G.3
Frazier, T.4
-
8
-
-
33745009333
-
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
-
DOI 10.1016/j.cose.2006.02.009, PII S0167404806000587
-
Artail H., Safa H., Sraj M., Kuwatly I., Al-Masri Z. (2006) A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Computers & Security 25: 274-288 (Pubitemid 43866957)
-
(2006)
Computers and Security
, vol.25
, Issue.4
, pp. 274-288
-
-
Artail, H.1
Safa, H.2
Sraj, M.3
Kuwatly, I.4
Al-Masri, Z.5
-
9
-
-
84882781665
-
Cyber SA: Situational awareness for cyber defense
-
10.1007/978-1-4419-0140-8-1
-
Barford P., Dacier M., Dietterich T. G., Fredrikson M., Giffin J., Jajodia S. et al (2010) Cyber SA: Situational awareness for cyber defense. Cyber Situational Awareness, Advances in Information Security 46: 3-13
-
(2010)
Cyber Situational Awareness, Advances in Information Security
, vol.46
, pp. 3-13
-
-
Barford, P.1
Dacier, M.2
Dietterich, T.G.3
Fredrikson, M.4
Giffin, J.5
Jajodia, S.6
-
10
-
-
33847144115
-
Paranoid penguin: Designing and using DMZ networks to protect internet servers
-
Bauer, M. (2001). Paranoid penguin: Designing and using DMZ networks to protect internet servers. Linux Journal, 2001(83es), 16.
-
(2001)
Linux Journal
, vol.2001
, Issue.83
, pp. 16
-
-
Bauer, M.1
-
11
-
-
3142657520
-
A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks
-
13-6 October
-
Bearavolu, R., Lakkaraju, K., Yurcik, W.; Raje, H. (2003). A visualization tool for situational awareness of tactical and strategic security events on large and complex computer networks. In Paper presented at the military communications conference (MILCOM) 2003, 13-6 October.
-
(2003)
Paper Presented at the Military Communications Conference (MILCOM) 2003
-
-
Bearavolu, R.1
Lakkaraju, K.2
Yurcik, W.3
Raje, H.4
-
12
-
-
79955893510
-
-
Master's Thesis, Ohio: Air Force Institute of Technology, Air University
-
Beauregard, J. E. (2001). Modeling information assurance. Master's Thesis, Ohio: Air Force Institute of Technology, Air University.
-
(2001)
Modeling Information Assurance
-
-
Beauregard, J.E.1
-
15
-
-
34748842440
-
-
NIST special publication 800-100. Gaithersburg: NIST
-
Bowen, P., Hash, J., Wilson, M., Bartol, N.; Jamaldinian, G. (2006). Information security handbook: A guide for managers. NIST special publication 800-100. Gaithersburg: NIST.
-
(2006)
Information Security Handbook: A Guide for Managers
-
-
Bowen, P.1
Hash, J.2
Wilson, M.3
Bartol, N.4
Jamaldinian, G.5
-
17
-
-
84976784123
-
Computer security: A survey
-
10.1145/1017536.1017537
-
Browne P. S. (1972) Computer security: A survey. ACM SIGMIS Database 4(3): 1-12
-
(1972)
ACM SIGMIS Database
, vol.4
, Issue.3
, pp. 1-12
-
-
Browne, P.S.1
-
18
-
-
0037244529
-
Reducing internet-based intrusions: Effective security patch management
-
Brykczynski, B.; Small, R. A. (2003). Reducing internet-based intrusions: Effective security patch management. IEEE Software, 20(1), 50-57.
-
(2003)
IEEE Software
, vol.20
, Issue.1
, pp. 50-57
-
-
Brykczynski, B.1
Small, R.A.2
-
21
-
-
33748563632
-
Application firewalls in a defence-in-depth design
-
DOI 10.1016/S1353-4858(06)70422-6, PII S1353485806704226
-
Byrne P. (2006) Application firewalls in a defence-in-depth design. Network Security 9: 9-11 (Pubitemid 44363050)
-
(2006)
Network Security
, vol.2006
, Issue.9
, pp. 9-11
-
-
Byrne, P.1
-
23
-
-
35048868488
-
Computer-based training for deception detection: What users want?
-
LNCS 3073
-
Cao, J., Lin, M., Deokar, A., Burgoon, J. K., Crews, J. M.; Adkins, M. (2004). Computer-based training for deception detection: What users want? ISI 2004, LNCS 3073 (pp. 163-175).
-
(2004)
ISI 2004
, pp. 163-175
-
-
Cao, J.1
Lin, M.2
Deokar, A.3
Burgoon, J.K.4
Crews, J.M.5
Adkins, M.6
-
25
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
10.1109/MNET.2002.1081761
-
Chakrabarti A., Manimaran G. (2002) Internet infrastructure security: A taxonomy. IEEE Network 16(6): 13-21
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
26
-
-
0031644299
-
A note on the role of deception in information protection
-
Cohen F. (1998) A note on the role of deception in information protection. Computers and Security 17(6): 483-506 (Pubitemid 128396180)
-
(1998)
Computers and Security
, vol.17
, Issue.6
, pp. 483-506
-
-
Cohen, F.1
-
29
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
10.1287/isre.1070.0160
-
D'Arcy J., Hovav A., Galletta D. F. (2009) User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research 20(1): 79-98
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.F.3
-
30
-
-
74449092722
-
A framework and assessment instrument for information security culture
-
10.1016/j.cose.2009.09.002
-
Da Veiga A., Eloff J. H. P. (2010) A framework and assessment instrument for information security culture. Computers and Security 29(2): 196-207
-
(2010)
Computers and Security
, vol.29
, Issue.2
, pp. 196-207
-
-
Da Veiga, A.1
Eloff, J.H.P.2
-
31
-
-
34247337085
-
Immuno-inspired autonomic system for cyber defense
-
University of Memphis
-
Dasgupta, D. (2004). Immuno-inspired autonomic system for cyber defense. Computer science technical report. University of Memphis.
-
(2004)
Computer Science Technical Report
-
-
Dasgupta, D.1
-
32
-
-
84255211950
-
An infrastructure for distributed event acquisition
-
Malta: Saint Julians, April
-
Debar, H., Morin, B., Boissee, V.; Guerin, D. (2005). An infrastructure for distributed event acquisition. In Paper presented at the European Institute for Computer Antivirus Research (EICAR) 2005 Conference Best Paper, Malta: Saint Julians, April.
-
(2005)
Paper Presented at the European Institute for Computer Antivirus Research (EICAR) 2005 Conference Best Paper
-
-
Debar, H.1
Morin, B.2
Boissee, V.3
Guerin, D.4
-
35
-
-
84964413051
-
Agile monitoring for cyber defense
-
June
-
Doyle, J., Kohane, I., Long, W., Shrobe, H.; Szolovits, P. (2001). Agile monitoring for cyber defense. In Paper presented at the 2001 DARPA Information Survivability Conference & Exposition II (DISCEX '01), June.
-
(2001)
Paper Presented at the 2001 DARPA Information Survivability Conference & Exposition II (DISCEX '01)
-
-
Doyle, J.1
Kohane, I.2
Long, W.3
Shrobe, H.4
Szolovits, P.5
-
38
-
-
84896396284
-
MINDS: A new approach to the information security process
-
Eilertson, E. E., Ertoz, L., Kumar, V. (2004). MINDS: A new approach to the information security process. In Paper presented at the 24th army science conference, December.
-
(2004)
Paper Presented at the 24th Army Science Conference, December
-
-
Eilertson, E.E.1
Ertoz, L.2
Kumar, V.3
-
39
-
-
10944259927
-
Risk-based systems security engineering: Stopping attacks with intention
-
DOI 10.1109/MSP.2004.109
-
Evans S., Kyle D. H., Piorkowski J., Wallner J. (2004) Risk-based systems security engineering: Stopping attacks with intention. IEEE Security Privacy 2(6): 59-62 (Pubitemid 40010911)
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 59-62
-
-
Evans, S.1
Heinbuch, D.2
Kyle, E.3
Plokkowski, J.4
Wallner, J.5
-
43
-
-
84896395369
-
Testing various modes of computer-based training for deception detection
-
LNCS 3073
-
George, J. F., Biros, D. P.; Adkins, M. (2004). Testing various modes of computer-based training for deception detection. In Paper presented at the ISI 2004, LNCS 3073.
-
(2004)
Paper Presented at the ISI 2004
-
-
George, J.F.1
Biros, D.P.2
Adkins, M.3
-
50
-
-
84917304630
-
The forgotten dimensions of strategy
-
10.2307/20040266
-
Howard M. (1979) The forgotten dimensions of strategy. Foreign Affairs 57(5): 975-986
-
(1979)
Foreign Affairs
, vol.57
, Issue.5
, pp. 975-986
-
-
Howard, M.1
-
51
-
-
79959944364
-
Does deterrence work in reducing information securiuty policy abuse by employees
-
10.1145/1953122.1953142
-
Hu Q., Xu Z., Dinev T., Ling H. (2011) Does deterrence work in reducing information securiuty policy abuse by employees. Communications of the ACM 54(6): 54-60
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
52
-
-
8844233022
-
Secure mobile agents for network vulnerability scanning
-
United States Military Academy, 6-7 June
-
Humphries, J. W., Carver, C. A., Jr.; Pooch, U. W. (2000). Secure mobile agents for network vulnerability scanning. In Paper presented at the 2000 IEEE workshop on information assurance and security, United States Military Academy, 6-7 June.
-
(2000)
Paper Presented at the 2000 IEEE Workshop on Information Assurance and Security
-
-
Humphries, J.W.1
Carver Jr., C.A.2
Pooch, U.W.3
-
53
-
-
0038009197
-
Defence in depth - Protecting the queen
-
DOI 10.1016/S1353-4858(03)00612-3, PII S1353485803006123
-
Hunter P. (2003) Defence in depth - protecting the queen. Network Security 6: 17-18 (Pubitemid 36721889)
-
(2003)
Network Security
, vol.2003
, Issue.6
, pp. 17-18
-
-
Hunter, P.1
-
54
-
-
0033474253
-
Deterrence and international conflict: Empirical findings and theoretical debate
-
10.1146/annurev.polisci.2.1.25
-
Huth P. K. (1999) Deterrence and international conflict: Empirical findings and theoretical debate. Annual Review of Political Science 2: 25-48
-
(1999)
Annual Review of Political Science
, vol.2
, pp. 25-48
-
-
Huth, P.K.1
-
56
-
-
84896401830
-
-
JCS. (1996). Joint publication 3-58: Joint doctrine for military deception
-
JCS. (1996). Joint publication 3-58: Joint doctrine for military deception.
-
-
-
-
57
-
-
84896394098
-
-
JCS. (1998). Joint publication 3-13: Joint doctrine for information operations
-
JCS. (1998). Joint publication 3-13: Joint doctrine for information operations.
-
-
-
-
58
-
-
84857888636
-
Overview of DoD defense in depth strategy
-
4 January edn. SANS Institute
-
Jones, B. (2005). Overview of DoD defense in depth strategy. Global information assurance certification paper, 4 January edn. SANS Institute.
-
(2005)
Global Information Assurance Certification Paper
-
-
Jones, B.1
-
61
-
-
84971585775
-
Qualitative research: Introducing focus groups
-
10.1136/bmj.311.7000.299
-
Kitzinger J. (1995) Qualitative research: Introducing focus groups. British Medical Journal 311: 299-302
-
(1995)
British Medical Journal
, vol.311
, pp. 299-302
-
-
Kitzinger, J.1
-
65
-
-
17544394392
-
Computer security in the real world
-
10.1109/MC.2004.17
-
Lampson B. W. (2004) Computer security in the real world. Computer 37(6): 37-46
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.W.1
-
67
-
-
84898347739
-
Towards a cultural framework for information security practices
-
M. Gupta, J. Walp & R. Sharman (Eds.)
-
Lim, J. S., Chang, S., Ahmad, A.; Maynard, S. B. (2012). Towards a cultural framework for information security practices. In M. Gupta, J. Walp & R. Sharman (Eds.), Strategic and practical approaches for information security governance: Technologies and applied solutions IGI global
-
(2012)
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions IGI Global
-
-
Lim, J.S.1
Chang, S.2
Ahmad, A.3
Maynard, S.B.4
-
69
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
DOI 10.1145/1053283.1053288
-
Liu P., Zang W., Yu M. (2005) Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security 8(1): 78-118 (Pubitemid 40479430)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
70
-
-
0035445905
-
A practical approach to enterprise IT security
-
DOI 10.1109/6294.952979
-
Liu S., Sullivan J., Ormaner J. (2001) A practical approach to enterprise IT security. IEEE IT Professional 3(5): 35-42 (Pubitemid 32922911)
-
(2001)
IT Professional
, vol.3
, Issue.5
, pp. 35-42
-
-
Liu, S.1
Sullivan, J.2
Ormaner, J.3
-
72
-
-
84896390976
-
-
SANS Institute InfoSec Reading Room, SANS Institute
-
McGuiness, T. (2001). Defense in depth. SANS Institute InfoSec Reading Room, SANS Institute.
-
(2001)
Defense in Depth
-
-
McGuiness, T.1
-
73
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
10.1109/52.877859
-
McHugh J., Christie A., Allen J. (2000) Defending yourself: The role of intrusion detection systems. IEEE Software 17(5): 42-51
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
77
-
-
10444243686
-
Learning attack strategies from intrusion alerts
-
Washington, October
-
Ning, P.; Xu, D. (2003). Learning attack strategies from intrusion alerts. In Paper presented at the ACM CCS'3, Washington, October.
-
(2003)
Paper Presented at the ACM CCS'3
-
-
Ning, P.1
Xu, D.2
-
79
-
-
85011322702
-
Towards understanding deterrence: Information security managers' perspective
-
Park, S., Ruighaver, A. B., Maynard, S. B.; Ahmad, A. (2011). Towards understanding deterrence: Information security managers' perspective. In Paper presented at the international conference on IT convergence and security 2011, Suwon.
-
(2011)
Paper Presented at the International Conference on IT Convergence and Security 2011, Suwon
-
-
Park, S.1
Ruighaver, A.B.2
Maynard, S.B.3
Ahmad, A.4
-
84
-
-
79960251487
-
A defense-in-depth security architecture strategy inspired by antiquity
-
Price, S. M. (2010). A defense-in-depth security architecture strategy inspired by antiquity. ISSA Journal, 8(3), 10-16
-
(2010)
ISSA Journal
, vol.8
, Issue.3
, pp. 10-16
-
-
Price, S.M.1
-
85
-
-
24344436427
-
Toward an automated attack model for red teams
-
DOI 10.1109/MSP.2005.111
-
Ray H. T., Vemuri R., Kantubhukta H. R. (2005) Toward an automated attack model for red teams. IEEE Security Privacy 3(4): 18-25 (Pubitemid 41259868)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.4
, pp. 18-25
-
-
Ray, H.T.1
Vemuri, R.2
Kantubhukta, H.R.3
-
86
-
-
84905228440
-
Using deception to shield cyberspace sensors
-
IFIP AICT, 3-18
-
Rice, M., Guernsey, D.; Shenoi, S. (2011). Using deception to shield cyberspace sensors. In Paper presented at the critical infrastructure protection V, IFIP AICT, 3-18
-
(2011)
Paper Presented at the Critical Infrastructure Protection v
-
-
Rice, M.1
Guernsey, D.2
Shenoi, S.3
-
87
-
-
84896395424
-
Computer security incidents agaist Australian businesses: Predictors of victimisation
-
Richards K., Davis B. (2010) Computer security incidents agaist Australian businesses: Predictors of victimisation. Trends Issues in Crime and Criminal Justice 399: 1-6
-
(2010)
Trends Issues in Crime and Criminal Justice
, vol.399
, pp. 1-6
-
-
Richards, K.1
Davis, B.2
-
89
-
-
42649108774
-
Situation awareness mechanisms for wireless sensor networks
-
DOI 10.1109/MCOM.2008.4481348
-
Roman R., Lopez J., Gritzalis S. (2008) Situation awareness mechanisms for wireless sensor networks. IEEE Communications Magazine 46(4): 102-107 (Pubitemid 351593415)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 102-107
-
-
Roman, R.1
Lopez, J.2
Gritzalis, S.3
-
93
-
-
70449122071
-
Defending cyberspace with fake honeypots
-
10.4304/jcp.2.2.25-36
-
Rowe N. C., Custy E. J., Duong B. T. (2007) Defending cyberspace with fake honeypots. Journal of Computers 2(2): 22-36
-
(2007)
Journal of Computers
, vol.2
, Issue.2
, pp. 22-36
-
-
Rowe, N.C.1
Custy, E.J.2
Duong, B.T.3
-
94
-
-
33846293675
-
Generating policies for defense in depth
-
Rubel, P., Ihde, M., Harp, S.; Payne, C. (2005). Generating policies for defense in depth. In: Paper presented at the 21st annual computer security applications conference, December.
-
(2005)
Paper Presented at the 21st Annual Computer Security Applications Conference, December
-
-
Rubel, P.1
Ihde, M.2
Harp, S.3
Payne, C.4
-
95
-
-
33144481697
-
Learning from information security history
-
DOI 10.1109/MSP.2006.17
-
Ruiu D. (2006) Learning from information security history. IEEE Security Privacy 4(1): 77-79 (Pubitemid 43269818)
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.1
, pp. 77-79
-
-
Ruiu, D.1
-
97
-
-
84896397128
-
MELANI- an analysis centre for the protection of critical infrastructure in the information age
-
Zurich, September
-
Rytz, R., Romer, J.; Henauer, M. (2003). MELANI- an analysis centre for the protection of critical infrastructure in the information age. In Paper presented at the workshop on cyber security & contingency planning: threats and infrastructure protection, Zurich, September.
-
(2003)
Paper Presented at the Workshop on Cyber Security & Contingency Planning: Threats and Infrastructure Protection
-
-
Rytz, R.1
Romer, J.2
Henauer, M.3
-
98
-
-
4243100593
-
Cyber defense: Art to science
-
10.1145/971617.971645
-
Saydjari O. S. (2004) Cyber defense: Art to science. Communications of the ACM 47(3): 53-57
-
(2004)
Communications of the ACM
, vol.47
, Issue.3
, pp. 53-57
-
-
Saydjari, O.S.1
-
101
-
-
84896393961
-
Defense in depth: The lessons from Troy and the Maginot line applied
-
SANS Institute
-
Sharlun, G. (2002). Defense in depth: The lessons from Troy and the Maginot line applied. Global information assurance certification paper. SANS Institute.
-
(2002)
Global Information Assurance Certification Paper
-
-
Sharlun, G.1
-
102
-
-
33846055775
-
Countering cyber war
-
Shimeall, T., Williams, P.; Dunlevy, C. (2001). Countering cyber war. NATO Review, 49, 16-18
-
(2001)
NATO Review
, vol.49
, pp. 16-18
-
-
Shimeall, T.1
Williams, P.2
Dunlevy, C.3
-
104
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy vilations
-
Siponen M., Vance A. (2010) Neutralization: New insights into the problem of employee information systems security policy vilations. MIS Quarterly 34(3): 487-502
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.1
Vance, A.2
-
106
-
-
84896388663
-
Six strategies for defense-in-depth: Securing the network from the inside out
-
Snyder, J. (2006). Six strategies for defense-in-depth: Securing the network from the inside out. Joel Snyder's Blog, Vol. 2011.
-
(2006)
Joel Snyder's Blog
, vol.2011
-
-
Snyder, J.1
-
107
-
-
3042683635
-
Worm and attack early warning: Piercing stealthy reconnaissance
-
10.1109/MSP.2004.28
-
Stolfo S. J. (2004) Worm and attack early warning: Piercing stealthy reconnaissance. IEEE Security Privacy 2(3): 73-75
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 73-75
-
-
Stolfo, S.J.1
-
108
-
-
0000280419
-
Effective is security: An empirical study
-
10.1287/isre.1.3.255
-
Straub D. W. (1990) Effective is security: An empirical study. Information Systems Research 1(3): 255-276
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
109
-
-
0002699431
-
Discovering and disciplining computer abuse in organizations: A field study
-
10.2307/249307
-
Straub D. W., Nance W. D. (1990) Discovering and disciplining computer abuse in organizations: A field study. MIS Quarterly 14(1): 45-62
-
(1990)
MIS Quarterly
, vol.14
, Issue.1
, pp. 45-62
-
-
Straub, D.W.1
Nance, W.D.2
-
110
-
-
0001133137
-
Coping with systems risk: Security planning models for management decision making
-
10.2307/249551
-
Straub D. W., Welke R. J. (1998) Coping with systems risk: Security planning models for management decision making. MIS Quarterly 22(4): 441-469
-
(1998)
MIS Quarterly
, vol.22
, Issue.4
, pp. 441-469
-
-
Straub, D.W.1
Welke, R.J.2
-
111
-
-
2342563769
-
Considering defense in depth for software applications
-
10.1109/MSECP.2004.1264860
-
Stytz M. R. (2004) Considering defense in depth for software applications. IEEE Security Privacy 2(1): 72-75
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.1
, pp. 72-75
-
-
Stytz, M.R.1
-
112
-
-
79960838421
-
Masquerade mimicry attack detection: A randomised approach
-
10.1016/j.cose.2011.05.004
-
Tapiador J. E., Clark J. A. (2011) Masquerade mimicry attack detection: A randomised approach. Computers and Security 30(5): 297-310
-
(2011)
Computers and Security
, vol.30
, Issue.5
, pp. 297-310
-
-
Tapiador, J.E.1
Clark, J.A.2
-
113
-
-
84925417743
-
Cyberwar strategy and tactics
-
United States Military Academy, June
-
Tinnel, L. S., Saydjari, O. S.; Farrell, D. (2002). Cyberwar strategy and tactics. In Paper presented at the 2002 IEEE workshop on information assurance, United States Military Academy, June.
-
(2002)
Paper Presented at the 2002 IEEE Workshop on Information Assurance
-
-
Tinnel, L.S.1
Saydjari, O.S.2
Farrell, D.3
-
118
-
-
0033489649
-
Strike back: Offensive actions in information warfare
-
Caledon Hills, September
-
Welch, D. J., Buchheit, N.; Ruocco, A. (1999). Strike back: Offensive actions in information warfare. In Paper presented at the 1999 Workshop on New Security Paradigms, Caledon Hills, September.
-
(1999)
Paper Presented at the 1999 Workshop on New Security Paradigms
-
-
Welch, D.J.1
Buchheit, N.2
Ruocco, A.3
-
119
-
-
2142714171
-
Resilient infrastructure for network security
-
10.1002/cplx.20005
-
Williamson M. M. (2004) Resilient infrastructure for network security. Complexity 9(2): 34-40
-
(2004)
Complexity
, vol.9
, Issue.2
, pp. 34-40
-
-
Williamson, M.M.1
-
121
-
-
3543146378
-
Firewall technologies
-
DOI 10.1109/45.985324
-
Zalenski R. (2002) Firewall technologies. IEEE Potentials 21((1): 24-29 (Pubitemid 44208135)
-
(2002)
IEEE Potentials
, vol.21
, Issue.1
, pp. 24-29
-
-
Zalenski, R.1
|