메뉴 건너뛰기




Volumn , Issue , 2015, Pages 1219-1224

Cyber-investment and cyber-information exchange decision modeling

Author keywords

Bismuth; Computer security; Games; Information management; Investment; Robustness

Indexed keywords

BISMUTH; COMPUTER GAMES; COMPUTERS; EMBEDDED SOFTWARE; EMBEDDED SYSTEMS; GAME THEORY; INFORMATION ANALYSIS; INFORMATION MANAGEMENT; INVESTMENTS; PROBABILITY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 84961696236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPCC-CSS-ICESS.2015.264     Document Type: Conference Paper
Times cited : (27)

References (20)
  • 1
    • 72249119892 scopus 로고    scopus 로고
    • The economic consequences of sharing security information
    • E. Gal-Or and A. Ghose, "The economic consequences of sharing security information. " Economics of information security, vol. 12, pp. 95-105, 2004.
    • (2004) Economics of Information Security , vol.12 , pp. 95-105
    • Gal-Or, E.1    Ghose, A.2
  • 2
    • 36148982304 scopus 로고    scopus 로고
    • Information sharing among firms and cyber attacks
    • K. Hausken, "Information sharing among firms and cyber attacks, " Journal of Accounting and Public Policy, vol. 26, pp. 639-688, 2007.
    • (2007) Journal of Accounting and Public Policy , vol.26 , pp. 639-688
    • Hausken, K.1
  • 6
    • 84908227974 scopus 로고    scopus 로고
    • Security automation and threat information-sharing options
    • P. Kampanakis, "Security automation and threat information-sharing options, " Security & Privacy, IEEE, vol. 12, no. 5, pp. 42-51, 2014.
    • (2014) Security & Privacy, IEEE , vol.12 , Issue.5 , pp. 42-51
    • Kampanakis, P.1
  • 8
    • 84961691839 scopus 로고    scopus 로고
    • http://fcw. com/articles/2014/08/06/what-keeps-darpa-up-at-night. aspx.
  • 9
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • L. A. Gordon, M. P. Loeb, and W. Lucyshyn, "Sharing information on computer systems security: An economic analysis, " Journal of Accounting and Public Policy, vol. 22, no. 6, pp. 461-485, 2003.
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.A.1    Loeb, M.P.2    Lucyshyn, W.3
  • 10
    • 80455155149 scopus 로고    scopus 로고
    • Knowledge sharing and investment decisions in information security
    • D. Liu, Y. Ji, and V. Mookerjee, "Knowledge sharing and investment decisions in information security, " Decision Support Systems, vol. 52, no. 1, pp. 95-107, 2011. [Online]. Available: http://www. sciencedirect. com/science/article/pii/S0167923611001151
    • (2011) Decision Support Systems , vol.52 , Issue.1 , pp. 95-107
    • Liu, D.1    Ji, Y.2    Mookerjee, V.3
  • 11
  • 13
    • 63149146044 scopus 로고    scopus 로고
    • Non-deteriorating choice
    • W. Bossert and Y. Sprumont, "Non-deteriorating choice, " Economica, vol. 76, no. 302, pp. 337-363, 2009.
    • (2009) Economica , vol.76 , Issue.302 , pp. 337-363
    • Bossert, W.1    Sprumont, Y.2
  • 16
    • 0000037307 scopus 로고
    • The strong case for the generalized logarithmic utility model as the premier model of financial markets
    • R. Litzenberger and M. Rubinstein, "The strong case for the generalized logarithmic utility model as the premier model of financial markets, " The Journal of Finance, vol. 31, no. 2, pp. 551-571, 1976.
    • (1976) The Journal of Finance , vol.31 , Issue.2 , pp. 551-571
    • Litzenberger, R.1    Rubinstein, M.2
  • 17
    • 0022675442 scopus 로고
    • The impact of litter effects on dose-response modeling in teratology
    • L. L. Kupper, C. Portier, M. D. Hogan, and E. Yamamoto, "The impact of litter effects on dose-response modeling in teratology, " Biometrics, pp. 85-98, 1986.
    • (1986) Biometrics , pp. 85-98
    • Kupper, L.L.1    Portier, C.2    Hogan, M.D.3    Yamamoto, E.4
  • 18
    • 0034581623 scopus 로고    scopus 로고
    • The beta poisson dose-response model is not a single-hit model
    • P. Teunis and A. Havelaar, "The beta poisson dose-response model is not a single-hit model, " Risk Analysis, vol. 20, no. 4, pp. 513-520, 2000.
    • (2000) Risk Analysis , vol.20 , Issue.4 , pp. 513-520
    • Teunis, P.1    Havelaar, A.2
  • 19
    • 77953296597 scopus 로고    scopus 로고
    • An attack-defense game theoretic analysis of multi-band wireless covert timing networks
    • S. Anand, S. Sengupta, and R. Chandramouli, "An attack-defense game theoretic analysis of multi-band wireless covert timing networks, " in INFOCOM, 2010 Proceedings IEEE. IEEE, 2010, pp. 1-9.
    • (2010) INFOCOM, 2010 Proceedings IEEE. IEEE , pp. 1-9
    • Anand, S.1    Sengupta, S.2    Chandramouli, R.3
  • 20
    • 84961729302 scopus 로고    scopus 로고
    • Metrics for measuring the efficacy of critical-infrastructure-centric cybersecurity information sharing efforts
    • M. H. Fleming and E. Goldstein, "Metrics for measuring the efficacy of critical-infrastructure-centric cybersecurity information sharing efforts, " Available at SSRN 2201033, 2012.
    • (2012) Available at SSRN 2201033
    • Fleming, M.H.1    Goldstein, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.