-
1
-
-
72249119892
-
The economic consequences of sharing security information
-
E. Gal-Or and A. Ghose, "The economic consequences of sharing security information. " Economics of information security, vol. 12, pp. 95-105, 2004.
-
(2004)
Economics of Information Security
, vol.12
, pp. 95-105
-
-
Gal-Or, E.1
Ghose, A.2
-
2
-
-
36148982304
-
Information sharing among firms and cyber attacks
-
K. Hausken, "Information sharing among firms and cyber attacks, " Journal of Accounting and Public Policy, vol. 26, pp. 639-688, 2007.
-
(2007)
Journal of Accounting and Public Policy
, vol.26
, pp. 639-688
-
-
Hausken, K.1
-
6
-
-
84908227974
-
Security automation and threat information-sharing options
-
P. Kampanakis, "Security automation and threat information-sharing options, " Security & Privacy, IEEE, vol. 12, no. 5, pp. 42-51, 2014.
-
(2014)
Security & Privacy, IEEE
, vol.12
, Issue.5
, pp. 42-51
-
-
Kampanakis, P.1
-
7
-
-
84863691172
-
Cybex: The cybersecurity information exchange framework (x. 1500)
-
Oct.
-
A. Rutkowski, Y. Kadobayashi, I. Furey, D. Rajnovic, R. Martin, T. Takahashi, C. Schultz, G. Reid, G. Schudel, M. Hird, and S. Adegbite, "Cybex: The cybersecurity information exchange framework (x. 1500), " SIGCOMM Comput. Commun. Rev., vol. 40, no. 5, pp. 59-64, Oct. 2010. [Online]. Available: http://doi. acm. org/10. 1145/1880153. 1880163
-
(2010)
SIGCOMM Comput. Commun. Rev.
, vol.40
, Issue.5
, pp. 59-64
-
-
Rutkowski, A.1
Kadobayashi, Y.2
Furey, I.3
Rajnovic, D.4
Martin, R.5
Takahashi, T.6
Schultz, C.7
Reid, G.8
Schudel, G.9
Hird, M.10
Adegbite, S.11
-
8
-
-
84961691839
-
-
http://fcw. com/articles/2014/08/06/what-keeps-darpa-up-at-night. aspx.
-
-
-
-
9
-
-
0344899914
-
Sharing information on computer systems security: An economic analysis
-
L. A. Gordon, M. P. Loeb, and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis, " Journal of Accounting and Public Policy, vol. 22, no. 6, pp. 461-485, 2003.
-
(2003)
Journal of Accounting and Public Policy
, vol.22
, Issue.6
, pp. 461-485
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
-
10
-
-
80455155149
-
Knowledge sharing and investment decisions in information security
-
D. Liu, Y. Ji, and V. Mookerjee, "Knowledge sharing and investment decisions in information security, " Decision Support Systems, vol. 52, no. 1, pp. 95-107, 2011. [Online]. Available: http://www. sciencedirect. com/science/article/pii/S0167923611001151
-
(2011)
Decision Support Systems
, vol.52
, Issue.1
, pp. 95-107
-
-
Liu, D.1
Ji, Y.2
Mookerjee, V.3
-
11
-
-
84910002351
-
Strategic discovery and sharing of vulnerabilities in competitive environments
-
M. Khouzani, V. Pham, and C. Cid, "Strategic discovery and sharing of vulnerabilities in competitive environments, " in Decision and Game Theory for Security. Springer, 2014, pp. 59-78.
-
(2014)
Decision and Game Theory for Security. Springer
, pp. 59-78
-
-
Khouzani, M.1
Pham, V.2
Cid, C.3
-
13
-
-
63149146044
-
Non-deteriorating choice
-
W. Bossert and Y. Sprumont, "Non-deteriorating choice, " Economica, vol. 76, no. 302, pp. 337-363, 2009.
-
(2009)
Economica
, vol.76
, Issue.302
, pp. 337-363
-
-
Bossert, W.1
Sprumont, Y.2
-
15
-
-
84953745168
-
An evolutionary game-theoretic framework for cyber-threat information sharing
-
D. K. Tosh, S. Sengupta, C. Kamhoua, K. A. Kwiat, and A. Martin, "An evolutionary game-theoretic framework for cyber-threat information sharing, " in Proceedings of the IEEE International Conference on Communications (ICC), 2015.
-
(2015)
Proceedings of the IEEE International Conference on Communications (ICC)
-
-
Tosh, D.K.1
Sengupta, S.2
Kamhoua, C.3
Kwiat, K.A.4
Martin, A.5
-
16
-
-
0000037307
-
The strong case for the generalized logarithmic utility model as the premier model of financial markets
-
R. Litzenberger and M. Rubinstein, "The strong case for the generalized logarithmic utility model as the premier model of financial markets, " The Journal of Finance, vol. 31, no. 2, pp. 551-571, 1976.
-
(1976)
The Journal of Finance
, vol.31
, Issue.2
, pp. 551-571
-
-
Litzenberger, R.1
Rubinstein, M.2
-
17
-
-
0022675442
-
The impact of litter effects on dose-response modeling in teratology
-
L. L. Kupper, C. Portier, M. D. Hogan, and E. Yamamoto, "The impact of litter effects on dose-response modeling in teratology, " Biometrics, pp. 85-98, 1986.
-
(1986)
Biometrics
, pp. 85-98
-
-
Kupper, L.L.1
Portier, C.2
Hogan, M.D.3
Yamamoto, E.4
-
18
-
-
0034581623
-
The beta poisson dose-response model is not a single-hit model
-
P. Teunis and A. Havelaar, "The beta poisson dose-response model is not a single-hit model, " Risk Analysis, vol. 20, no. 4, pp. 513-520, 2000.
-
(2000)
Risk Analysis
, vol.20
, Issue.4
, pp. 513-520
-
-
Teunis, P.1
Havelaar, A.2
-
19
-
-
77953296597
-
An attack-defense game theoretic analysis of multi-band wireless covert timing networks
-
S. Anand, S. Sengupta, and R. Chandramouli, "An attack-defense game theoretic analysis of multi-band wireless covert timing networks, " in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.
-
(2010)
INFOCOM, 2010 Proceedings IEEE. IEEE
, pp. 1-9
-
-
Anand, S.1
Sengupta, S.2
Chandramouli, R.3
-
20
-
-
84961729302
-
Metrics for measuring the efficacy of critical-infrastructure-centric cybersecurity information sharing efforts
-
M. H. Fleming and E. Goldstein, "Metrics for measuring the efficacy of critical-infrastructure-centric cybersecurity information sharing efforts, " Available at SSRN 2201033, 2012.
-
(2012)
Available at SSRN 2201033
-
-
Fleming, M.H.1
Goldstein, E.2
|