-
1
-
-
84862303039
-
Incident response teams - Challenges in supporting the organisational security function
-
A. Ahmad, J. Hadgkiss, and A.B. Ruighaver Incident response teams - challenges in supporting the organisational security function Comput Secur 31 5 2012 643 652
-
(2012)
Comput Secur
, vol.31
, Issue.5
, pp. 643-652
-
-
Ahmad, A.1
Hadgkiss, J.2
Ruighaver, A.B.3
-
2
-
-
84881095404
-
Measuring the cost of cybercrime
-
R. Anderson, C. Barton, R. Böhme, R. Clayton, M. Eeten, and M. Levi et al. Measuring the cost of cybercrime 11th Workshop on the Economics of Information Security (WEIS'12) 2012
-
(2012)
11th Workshop on the Economics of Information Security (WEIS'12)
-
-
Anderson, R.1
Barton, C.2
Böhme, R.3
Clayton, R.4
Eeten, M.5
Levi, M.6
-
3
-
-
21644436956
-
Field studies of computer system administrators: Analysis of system management tools and practices
-
Computer Supported Cooperative Work - Conference Proceedings, CSCW 2004
-
R. Barrett, E. Kandogan, P.P. Maglio, E.M. Haber, L.A. Takayama, and M. Prabaker Field studies of computer system administrators: analysis of system management tools and practices Proceedings of the 2004 ACM conference on Computer supported cooperative work (CSCW '04) 2004 ACM New York, NY, USA 388 395 http://doi.acm.org/10.1145/1031607.1031672 (Pubitemid 40928541)
-
(2004)
Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW
, pp. 388-395
-
-
Barrett, R.1
Kandogan, E.2
Maglio, P.P.3
Haber, E.M.4
Takayama, L.A.5
Prabaker, M.6
-
5
-
-
84864002621
-
Information technology incident management: A case study of the University of Oviedo and the Faculty of Teacher Training and Education
-
J.F. Cadavieco, C.R. Pérez, and C.B. Fernández Information technology incident management: a case study of the University of Oviedo and the Faculty of Teacher Training and Education Univ Knowl Soc J (RUSC) 9 2 2012 280 295
-
(2012)
Univ Knowl Soc J (RUSC)
, vol.9
, Issue.2
, pp. 280-295
-
-
Cadavieco, J.F.1
Pérez, C.R.2
Fernández, C.B.3
-
7
-
-
77957923047
-
Creating an ITIL inspired incident management approach: Roots, response, and results
-
10.1109/NOMSW.2010.5486589
-
J. Cusick, and G. Ma Creating an ITIL inspired incident management approach: roots, response, and results Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP 2010 142 148 10.1109/NOMSW.2010.5486589
-
(2010)
Network Operations and Management Symposium Workshops (NOMS Wksps), 2010 IEEE/IFIP
, pp. 142-148
-
-
Cusick, J.1
Ma, G.2
-
8
-
-
84555190216
-
Information needs of system administrators in information technology service factories
-
ACM New York, NY, USA
-
C.R.B. de Souza, C.S. Pinhanez, and V.F. Cavalcante Information needs of system administrators in information technology service factories Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT '11) 2011 ACM New York, NY, USA 10 http://doi.acm.org/10.1145/2076444.2076447
-
(2011)
Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT '11)
, pp. 10
-
-
De Souza, C.R.B.1
Pinhanez, C.S.2
Cavalcante, V.F.3
-
10
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organisations
-
10.1057/ejis.2009.6
-
T. Herath, and H.R. Rao Protection motivation and deterrence: a framework for security policy compliance in organisations Eur J Inf Syst 18 2 2009 106 125 10.1057/ejis.2009.6
-
(2009)
Eur J Inf Syst
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
12
-
-
81755176763
-
New method of forensic computing in a small organization
-
S. Ismail, A. Ahmad, and M.A.M. Shukran New method of forensic computing in a small organization Aust J Basic Appl Sci 5 9 2011 2019 2025
-
(2011)
Aust J Basic Appl Sci
, vol.5
, Issue.9
, pp. 2019-2025
-
-
Ismail, S.1
Ahmad, A.2
Shukran, M.A.M.3
-
14
-
-
48249133620
-
A study of information security practice in a critical infrastructure application
-
C. Rong, M.G. Jaatun, F.E. Sandnes, L.T. Yang, J. Ma, Lecture Notes in Computer Science Springer Berlin Heidelberg 10.1007/978-3-540-69295-9-42
-
M.G. Jaatun, E. Albrechtsen, M. Line, S.O. Johnsen, I. Wærø, and O.H. Longva et al. A study of information security practice in a critical infrastructure application C. Rong, M.G. Jaatun, F.E. Sandnes, L.T. Yang, J. Ma, Autonomic and Trusted Computing Lecture Notes in Computer Science vol. 5060 2008 Springer Berlin Heidelberg 527 539 10.1007/978-3-540-69295-9-42
-
(2008)
Autonomic and Trusted Computing
, vol.5060 VOL.
, pp. 527-539
-
-
Jaatun, M.G.1
Albrechtsen, E.2
Line, M.3
Johnsen, S.O.4
Wærø, I.5
Longva, O.H.6
-
15
-
-
64749084618
-
A framework for incident response management in the petroleum industry
-
M.G. Jaatun, E. Albrechtsen, M.B. Line, I.A. Tøndel, and O.H. Longva A framework for incident response management in the petroleum industry Int J Crit Infrastruct Prot 2 2009 26 37
-
(2009)
Int J Crit Infrastruct Prot
, vol.2
, pp. 26-37
-
-
Jaatun, M.G.1
Albrechtsen, E.2
Line, M.B.3
Tøndel, I.A.4
Longva, O.H.5
-
16
-
-
33750386836
-
Network intrusion investigation - Preparation and challenges
-
DOI 10.1016/j.diin.2006.08.001, PII S1742287606000922
-
A. Johnston, and J. Reust Network intrusion investigation preparation and challenges Digit Investig 3 3 2006 118 126 10.1016/j.diin.2006.08.001 http://www.sciencedirect.com/science/article/pii/S1742287606000922 (Pubitemid 44642357)
-
(2006)
Digital Investigation
, vol.3
, Issue.3
, pp. 118-126
-
-
Johnston, A.1
Reust, J.2
-
19
-
-
1242263532
-
Why there aren't more information security research studies
-
10.1016/j.im.2003.08.001
-
A.G. Kotulic, and J.G. Clark Why there aren't more information security research studies Inf Manag 41 5 2004 597 607 10.1016/j.im.2003.08.001 http://www.sciencedirect.com/science/article/pii/S0378720603000995
-
(2004)
Inf Manag
, vol.41
, Issue.5
, pp. 597-607
-
-
Kotulic, A.G.1
Clark, J.G.2
-
22
-
-
84883337853
-
A case study: Preparing for the smart grids - Identifying current practice for information security incident management in the power industry
-
M.B. Line A case study: preparing for the smart grids - identifying current practice for information security incident management in the power industry Seventh International Conference on IT Security Incident Management and IT Forensics (IMF) 2013
-
(2013)
Seventh International Conference on IT Security Incident Management and IT Forensics (IMF)
-
-
Line, M.B.1
-
24
-
-
34748857961
-
Setting up a GRID-CERT, Experiences of an academic CSIRT
-
K. Möller Setting up a GRID-CERT, Experiences of an academic CSIRT Campus Wide Inf Syst 24 4 2007 260 270
-
(2007)
Campus Wide Inf Syst
, vol.24
, Issue.4
, pp. 260-270
-
-
Möller, K.1
-
25
-
-
84857359642
-
Unrealistic optimism on information security management
-
10.1016/j.cose.2011.12.001
-
H.S. Rhee, Y.U. Ryu, and C.T. Kim Unrealistic optimism on information security management Comput Secur 31 2 2012 221 232 10.1016/j.cose.2011.12.001 http://www.sciencedirect.com/science/article/pii/S0167404811001441
-
(2012)
Comput Secur
, vol.31
, Issue.2
, pp. 221-232
-
-
Rhee, H.S.1
Ryu, Y.U.2
Kim, C.T.3
-
27
-
-
84902674022
-
Proactive incident response
-
F. Scholl, and M. Mangold Proactive incident response Inf Syst Secur Assoc J 9 2 2011 http://www.issa.org/?page=JournalFebruary2011
-
(2011)
Inf Syst Secur Assoc J
, vol.9
, Issue.2
-
-
Scholl, F.1
Mangold, M.2
-
28
-
-
64849099080
-
The challenges of using an intrusion detection system: Is it worth the effort?
-
ACM New York, NY, USA
-
R. Werlinger, K. Hawkey, K. Muldner, P. Jaferian, and K. Beznosov The challenges of using an intrusion detection system: is it worth the effort? Proceedings of the 4th symposium on Usable privacy and security (SOUPS '08) 2008 ACM New York, NY, USA 107 118 http://doi.acm.org/10.1145/1408664.1408679
-
(2008)
Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS '08)
, pp. 107-118
-
-
Werlinger, R.1
Hawkey, K.2
Muldner, K.3
Jaferian, P.4
Beznosov, K.5
-
29
-
-
77949522891
-
Preparation, detection, and analysis: The diagnostic work of IT security incident response
-
R. Werlinger, K. Muldner, K. Hawkey, and K. Beznosov Preparation, detection, and analysis: the diagnostic work of IT security incident response Inf Manag Comput Secur 18 1 2010 26 42
-
(2010)
Inf Manag Comput Secur
, vol.18
, Issue.1
, pp. 26-42
-
-
Werlinger, R.1
Muldner, K.2
Hawkey, K.3
Beznosov, K.4
-
30
-
-
0343472271
-
-
M.J. West-Brown, D. Stikvoort, K.P. Kossakowski, G. Killcrece, R. Ruefle, and M. Zajicek Handbook for Computer Security Incident Response Teams (CSIRTs) 2003
-
(2003)
Handbook for Computer Security Incident Response Teams (CSIRTs)
-
-
West-Brown, M.J.1
Stikvoort, D.2
Kossakowski, K.P.3
Killcrece, G.4
Ruefle, R.5
Zajicek, M.6
|