-
1
-
-
84906336624
-
Stolen data is tracked to hacking at Lockheed
-
June 3
-
C. Drew, "Stolen data is tracked to hacking at Lockheed," New York Times, http://www. nytimes. com/2011/06/04/technology/ 04security. html, June 3, 2011
-
(2011)
New York Times
-
-
Drew, C.1
-
2
-
-
84939642844
-
A sobering day
-
May 29
-
A. Betts, "A sobering day," Financial Times Labs, http://labs. ft. com/ 2013/05/a-sobering-day/, May 29, 2013
-
(2013)
Financial Times Labs
-
-
Betts, A.1
-
3
-
-
84910012094
-
A survey of interdependent security games
-
Tech. Rep. CRYSYS-TR-2012-11-15, Nov
-
A. Laszka, M. Felegyhazi, and L. Buttyán, "A survey of interdependent security games," CrySyS Lab, Budapest University of Technology and Economics, Tech. Rep. CRYSYS-TR-2012-11-15, Nov 2012
-
(2012)
CrySyS Lab, Budapest University of Technology and Economics
-
-
Laszka, A.1
Felegyhazi, M.2
Buttyán, L.3
-
5
-
-
84984863583
-
How many down? Toward understanding systematic risk in networks
-
B. Johnson, A. Laszka, and J. Grossklags, "How many down? Toward understanding systematic risk in networks," in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014
-
(2014)
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Johnson, B.1
Laszka, A.2
Grossklags, J.3
-
6
-
-
84950307178
-
Estimating systematic risk in real-world networks
-
A. Laszka, B. Johnson, J. Grossklags, and M. Felegyhazi, "Estimating systematic risk in real-world networks," in Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC), 2014
-
(2014)
Proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC)
-
-
Laszka, A.1
Johnson, B.2
Grossklags, J.3
Felegyhazi, M.4
-
7
-
-
3042816249
-
Liability and computer security: Nine principles
-
Brighton, UK, Nov.
-
R. Anderson, "Liability and computer security: Nine principles," in Proceedings of the Third European Symposium on Research in Computer Security (ESORICS), Brighton, UK, Nov. 1994, pp. 231-245
-
(1994)
Proceedings of the Third European Symposium on Research in Computer Security (ESORICS)
, pp. 231-245
-
-
Anderson, R.1
-
8
-
-
81755167566
-
Towards insurable network architectures
-
R. Böhme, "Towards insurable network architectures," it-Information Technology, vol. 52, no. 5, pp. 290-293, 2010
-
(2010)
It-Information Technology
, vol.52
, Issue.5
, pp. 290-293
-
-
Böhme, R.1
-
10
-
-
60049087267
-
The monoculture risk put into context
-
Jan.
-
K. Birman and F. Schneider, "The monoculture risk put into context," IEEE Security and Privacy, vol. 7, no. 1, pp. 14-17, Jan. 2009
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 14-17
-
-
Birman, K.1
Schneider, F.2
-
11
-
-
14844282642
-
Cyberinsecurity: The cost of monopoly
-
D. Geer, C. Pfleeger, B. Schneier, J. Quarterman, P. Metzger, R. Bace, and P. Gutmann, "Cyberinsecurity: The cost of monopoly. How the dominance of Microsoft's products poses a risk to society," 2003
-
(2003)
How the Dominance of Microsoft's Products Poses a Risk to Society
-
-
Geer, D.1
Pfleeger, C.2
Schneier, B.3
Quarterman, J.4
Metzger, P.5
Bace, R.6
Gutmann, P.7
-
13
-
-
80051749786
-
Correlated failures, diversification, and information security risk management
-
Jun.
-
P.-Y. Chen, G. Kataria, and R. Krishnan, "Correlated failures, diversification, and information security risk management," MIS Quarterly, vol. 35, no. 2, pp. 397-422, Jun. 2011
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 397-422
-
-
Chen, P.-Y.1
Kataria, G.2
Krishnan, R.3
-
14
-
-
33750482906
-
System reliability and free riding
-
J. Camp and S. Lewis, Eds. Dordrecht, The Netherlands: Kluwer Academic Publishers
-
H. Varian, "System reliability and free riding," in Economics of Information Security, J. Camp and S. Lewis, Eds. Dordrecht, The Netherlands: Kluwer Academic Publishers, 2004, pp. 1-15
-
(2004)
Economics of Information Security
, pp. 1-15
-
-
Varian, H.1
-
15
-
-
57349198694
-
Secure or insure?: A gametheoretic analysis of information security games
-
J. Grossklags, N. Christin, and J. Chuang, "Secure or insure?: A gametheoretic analysis of information security games," in Proceedings of the 17th International World Wide Web Conference, 2008, pp. 209-218
-
(2008)
Proceedings of the 17th International World Wide Web Conference
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
16
-
-
81755188455
-
Security games with market insurance
-
B. Johnson, R. Böhme, and J. Grossklags, "Security games with market insurance," Decision and Game Theory for Security, pp. 117-130, 2011
-
(2011)
Decision and Game Theory for Security
, pp. 117-130
-
-
Johnson, B.1
Böhme, R.2
Grossklags, J.3
-
17
-
-
33746689683
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
Sep.
-
J. Aspnes, K. Chang, and A. Yampolskiy, "Inoculation strategies for victims of viruses and the sum-of-squares partition problem," J. Computer and System Sciences, vol. 72, no. 6, pp. 1077-1093, Sep. 2006
-
(2006)
J. Computer and System Sciences
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
18
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game
-
T. Moscibroda, S. Schmid, and R. Wattenhofer, "When selfish meets evil: Byzantine players in a virus inoculation game," in Proceedings of the ACM Symposium on Principles of Distributed Computing, 2006, pp. 35-44
-
(2006)
Proceedings of the ACM Symposium on Principles of Distributed Computing
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
21
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Physical Review Letters, vol. 86, no. 14, pp. 3200-3203, 2001
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
22
-
-
4043049130
-
Epidemic threshold in structured scale-free networks
-
V. Eguiluz and K. Klemm, "Epidemic threshold in structured scale-free networks," Physical Review Letters, vol. 89, no. 10, p. 108701, 2002
-
(2002)
Physical Review Letters
, vol.89
, Issue.10
, pp. 108701
-
-
Eguiluz, V.1
Klemm, K.2
-
23
-
-
41349112686
-
Epidemic dynamics in finite size scale-free networks
-
R. Pastor-Satorras and A. Vespignani, "Epidemic dynamics in finite size scale-free networks," Physical Review E, vol. 65, no. 3, p. 035108, 2002
-
(2002)
Physical Review e
, vol.65
, Issue.3
, pp. 035108
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
24
-
-
27644462218
-
Epidemic spreading in real networks: An eigenvalue viewpoint
-
Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic spreading in real networks: An eigenvalue viewpoint," in Proceedings of the 22nd International Symposium on Reliable Distributed Systems, 2003, pp. 25-34
-
(2003)
Proceedings of the 22nd International Symposium on Reliable Distributed Systems
, pp. 25-34
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
-
25
-
-
39349087037
-
Epidemic thresholds in real networks
-
D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, "Epidemic thresholds in real networks," ACM Transactions on Information and System Security, vol. 10, no. 4, p. 1, 2008
-
(2008)
ACM Transactions on Information and System Security
, vol.10
, Issue.4
, pp. 1
-
-
Chakrabarti, D.1
Wang, Y.2
Wang, C.3
Leskovec, J.4
Faloutsos, C.5
-
26
-
-
25844439630
-
The effect of network topology on the spread of epidemics
-
Mar.
-
A. Ganesh, L. Massoulié, and D. Towsley, "The effect of network topology on the spread of epidemics," in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Mar. 2005, pp. 1455-1466
-
(2005)
Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, pp. 1455-1466
-
-
Ganesh, A.1
Massoulié, L.2
Towsley, D.3
-
27
-
-
0037786763
-
Interdependent security
-
H. Kunreuther and G. Heal, "Interdependent security," Journal of Risk and Uncertainty, vol. 26, no. 2, pp. 231-249, 2003
-
(2003)
Journal of Risk and Uncertainty
, vol.26
, Issue.2
, pp. 231-249
-
-
Kunreuther, H.1
Heal, G.2
-
28
-
-
34848844983
-
Interdependent security: A general model
-
10706 August
-
G. Heal and H. Kunreuther, "Interdependent security: A general model," NBER Working Paper No. 10706, August 2004
-
(2004)
NBER Working Paper
-
-
Heal, G.1
Kunreuther, H.2
-
29
-
-
78650721633
-
Uncertainty in interdependent security games
-
B. Johnson, J. Grossklags, N. Christin, and J. Chuang, "Uncertainty in interdependent security games," Decision and Game Theory for Security, pp. 234-244, 2010
-
(2010)
Decision and Game Theory for Security
, pp. 234-244
-
-
Johnson, B.1
Grossklags, J.2
Christin, N.3
Chuang, J.4
-
30
-
-
84886075365
-
Interdependent defense games: Modeling interdependent security under deliberate attacks
-
Catalina Island, CA, Aug.
-
H. Chan, M. Ceyko, and L. Ortiz, "Interdependent defense games: Modeling interdependent security under deliberate attacks," in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI), Catalina Island, CA, Aug. 2012, pp. 152-162
-
(2012)
Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI)
, pp. 152-162
-
-
Chan, H.1
Ceyko, M.2
Ortiz, L.3
-
32
-
-
67749140118
-
Scale-free networks: A decade and beyond
-
Jul.
-
A.-L. Barabási, "Scale-free networks: A decade and beyond," Science, vol. 325, no. 5939, pp. 412-413, Jul. 2009
-
(2009)
Science
, vol.325
, Issue.5939
, pp. 412-413
-
-
Barabási, A.-L.1
-
33
-
-
0038483826
-
Emergence of scaling in random networks
-
Oct.
-
A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439, pp. 509-512, Oct. 1999
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
34
-
-
84924181828
-
Towards a theory of scale-free graphs: Definition, properties, and implications
-
L. Li, D. Alderson, J. Doyle, and W. Willinger, "Towards a theory of scale-free graphs: Definition, properties, and implications," Internet Mathematics, vol. 2, no. 4, pp. 431-523, 2005
-
(2005)
Internet Mathematics
, vol.2
, Issue.4
, pp. 431-523
-
-
Li, L.1
Alderson, D.2
Doyle, J.3
Willinger, W.4
-
35
-
-
15444372528
-
Subnets of scale-free networks are not scale-free: Sampling properties of networks
-
M. Stumpf, C. Wiuf, and R. May, "Subnets of scale-free networks are not scale-free: Sampling properties of networks," Proceedings of the National Academy of Sciences of the United States of America, vol. 102, no. 12, pp. 4221-4224, 2005
-
(2005)
Proceedings of the National Academy of Sciences of the United States of America
, vol.102
, Issue.12
, pp. 4221-4224
-
-
Stumpf, M.1
Wiuf, C.2
May, R.3
-
36
-
-
70349978583
-
On the number and the distribution of the Nash equilibria in supermodular games and their impact on the tipping set
-
Istanbul, Turkey, May
-
S. Dhall, S. Lakshmivarahan, and P. Verma, "On the number and the distribution of the Nash equilibria in supermodular games and their impact on the tipping set," in Proceedings of the International Conference on Game Theory for Networks (GameNets), Istanbul, Turkey, May 2009, pp. 691-696
-
(2009)
Proceedings of the International Conference on Game Theory for Networks (GameNets)
, pp. 691-696
-
-
Dhall, S.1
Lakshmivarahan, S.2
Verma, P.3
-
37
-
-
84899006528
-
Algorithms for interdependent security games
-
S. Thrun, L. Saul, and B. Schölkopf, Eds. MIT Press
-
M. Kearns and L. Ortiz, "Algorithms for interdependent security games," in Advances in Neural Information Processing Systems 16, S. Thrun, L. Saul, and B. Schölkopf, Eds. MIT Press, 2004, pp. 561-568
-
(2004)
Advances in Neural Information Processing Systems
, vol.16
, pp. 561-568
-
-
Kearns, M.1
Ortiz, L.2
|