-
1
-
-
85005305538
-
Themarket for "lemons": Quality uncertainty and the market mechanism
-
Aug
-
G. A. Akerlof. 1970. Themarket for "lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics 84, 3 (Aug. 1970), 488-500.
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
3
-
-
84871258626
-
Security of interdependent and identical Networked Control Systems
-
2012
-
S. Amin, G. A. Schwartz, and S. S. Sastry. 2012. Security of interdependent and identical Networked Control Systems. Automatica 42, 1 (2012), 186-192.
-
(2012)
Automatica
, vol.42
, Issue.1
, pp. 186-192
-
-
Amin, S.1
Schwartz, G.A.2
Sastry, S.S.3
-
5
-
-
33750440197
-
The economics of information security
-
Oct
-
R. Anderson and T. Moore. 2006. The economics of information security. Science 314, 5799 (Oct. 2006), 610-613.
-
(2006)
Science
, vol.314
, Issue.5799
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
7
-
-
33746689683
-
2006. Inoculation strategies for victims of viruses and the sum-ofsquares partition problem
-
Sept
-
J. Aspnes, K. Chang, and A. Yampolskiy. 2006. Inoculation strategies for victims of viruses and the sum-ofsquares partition problem. Journal of Computing System Science 72, 6 (Sept. 2006), 1077-1093.
-
(2006)
Journal of Computing System Science
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
9
-
-
84873617895
-
Duqu: Analysis, detection, and lessons learned
-
B. Bencsáth, G. Pék, L. Buttyán, and M. Felegyhazi. 2012. Duqu: Analysis, detection, and lessons learned. In Proceedings of the 5th European Workshop on System Security (EuroSec'12). ACM. 1-6.
-
(2012)
Proceedings of the 5th European Workshop on System Security (EuroSec'12) ACM.
, pp. 1-6
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Felegyhazi, M.4
-
15
-
-
84905827579
-
-
Defence Signals Directorate.,Retrieved from
-
Defence Signals Directorate. 2012. Top 35 Mitigation Strategies. Retrieved from infosec/top35mitigationstrategies.http://www.dsd.gov.au/infosec/top35mitigationstrategies.htm.
-
(2012)
Top 35 Mitigation Strategies
-
-
-
20
-
-
84990029315
-
The economics of information security investment
-
Nov 2002
-
L. A. Gordon and M. P. Loeb. 2002. The economics of information security investment. ACM Transactions on Information and System Security 5, 4 (Nov. 2002), 438-457. DOI:http://dx.doi.org/10.1145/581271.581274
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 438-457
-
-
Gordon, L.A.1
Loeb, M.P.2
-
21
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
L. A. Gordon, M. P. Loeb, and W. Lucyshyn. 2003. Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22, 6 (2003), 461-485.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
23
-
-
81755168896
-
The price of uncertainty in security games
-
T. Moore D. Pym, and C. Ioannidis (Eds.). Springer
-
J. Grossklags, B. Johnson, and N. Christin. 2010a. The price of uncertainty in security games. In Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis (Eds.). Springer, 9-32.
-
(2010)
Economics of Information Security and Privacy
, pp. 9-32
-
-
Grossklags, J.1
Johnson, B.2
Christin, N.3
-
25
-
-
33751256271
-
Income, interdependence, and substitution effects affecting incentives for security investment
-
K. Hausken. 2006. Income, interdependence, and substitution effects affecting incentives for security investment. Journal of Accounting and Public Policy 25, 6 (2006), 629-665.
-
(2006)
Journal of Accounting and Public Policy
, vol.25
, Issue.6
, pp. 629-665
-
-
Hausken, K.1
-
26
-
-
34848844983
-
-
Technical Report NBER Working Paper No. 10706. National Bureau of Economic Research
-
G. Heal and H. Kunreuther. 2004. Interdependent Security: A General Model. Technical Report NBER Working Paper No. 10706. National Bureau of Economic Research.
-
(2004)
Interdependent Security: A General Model
-
-
Heal, G.1
Kunreuther, H.2
-
32
-
-
79955481246
-
How bad are selfish investments in network security?
-
Apr. 2011
-
L. Jiang, V. Anantharam, and J. Walrand. 2011. How bad are selfish investments in network security? IEEE/ACM Transactions on Networking 19, 2 (Apr. 2011), 549-560. DOI:http://dx.doi.org/10.1109/ TNET.2010.2071397
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.2
, pp. 549-560
-
-
Jiang, L.1
Anantharam, V.2
Walrand, J.3
-
34
-
-
58449109144
-
Algorithms for interdependent security games
-
S. Thrun L. K. Saul, and B. Schölkopf (Eds.). MIT Press
-
M. J. Kearns and L. E. Ortiz. 2003. Algorithms for interdependent security games. In Advances in Neural Information Processing Systems, S. Thrun, L. K. Saul, and B. Schölkopf (Eds.). MIT Press.
-
(2003)
Advances in Neural Information Processing Systems
-
-
Kearns, M.J.1
Ortiz, L.E.2
-
43
-
-
80051960199
-
Click trajectories: End-To-end analysis of the spam value chain
-
K. Levchenko, N. Chachra, B. Enright, C. Felegyhazi, M. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, A. McCoy, D. Pitsillidis, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. 2011. Click trajectories: End-To-end analysis of the spam value chain. In Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland'11). 431-446.
-
(2011)
Proceedings of the 32nd IEEE Symposium on Security and Privacy (Oakland'11)
, pp. 431-446
-
-
Levchenko, K.1
Chachra, N.2
Enright, B.3
Felegyhazi, C.4
Grier, M.5
Halvorson, T.6
Kanich, C.7
Kreibich, C.8
Liu, H.9
McCoy, A.10
Pitsillidis, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
44
-
-
84874284297
-
Game theory meets network security and privacy
-
M. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J. P. Hubaux. 2013. Game theory meets network security and privacy. Computing Surveys 45, 3 (2013).
-
(2013)
Computing Surveys
, vol.45
, Issue.3
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.P.5
-
48
-
-
61449222889
-
Virus spread in networks
-
Piet Van Mieghem, Jasmina Omic, and Robert E. Kooij. 2009. Virus spread in networks. IEEE/ACM Transactions on Networking 17, 1 (2009), 1-14.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 1-14
-
-
Van Mieghem, P.1
Omic, J.2
Kooij, R.E.3
-
49
-
-
64549128286
-
Security investment games of interdependent organizations
-
IEEE
-
R. A. Miura-Ko, B. Yolken, N. Bambos, and J. Mitchell. 2008a. Security investment games of interdependent organizations. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing (Allerton'08). IEEE, 252-260.
-
(2008)
Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing (Allerton'08)
, pp. 252-260
-
-
Miura-Ko, R.A.1
Yolken, B.2
Bambos, N.3
Mitchell, J.4
-
60
-
-
33947600544
-
Learning correlated equilibria in games with compact sets of strategies
-
G. Stoltz and G. Lugosi. 2007. Learning correlated equilibria in games with compact sets of strategies. Games and Economic Behavior 59, 1 (2007), 187-208.
-
(2007)
Games and Economic Behavior
, vol.59
, Issue.1
, pp. 187-208
-
-
Stoltz, G.1
Lugosi, G.2
-
61
-
-
84873813961
-
Selfish response to epidemic propagation
-
Feb. 2013
-
G. Theodorakopoulos, J. Y. L. Boudec, and J. S. Baras. 2013. Selfish response to epidemic propagation. IEEE Trans. Automat. Control 58, 2 (Feb. 2013), 363-376.
-
(2013)
IEEE Trans. Automat. Control
, vol.58
, Issue.2
, pp. 363-376
-
-
Theodorakopoulos, G.1
Boudec, J.Y.L.2
Baras, J.S.3
|