-
1
-
-
84954443791
-
-
The Economist October 27
-
Open-Air computers. The Economist, October 27 2012.
-
(2012)
Open-Air Computers
-
-
-
5
-
-
33750440197
-
The economics of information security: A survey and open questions
-
R. Anderson and T. Moore. The economics of information security: A survey and open questions. Science, 314:610-613, 2006.
-
(2006)
Science
, vol.314
, pp. 610-613
-
-
Anderson, R.1
Moore, T.2
-
6
-
-
84978640047
-
The first rule of zero-days is no one talks about zero-days (so we'll explain)
-
October 20
-
S. Anthony. The first rule of zero-days is no one talks about zero-days (so we'll explain). Ars Technica, October 20 2015.
-
(2015)
Ars Technica
-
-
Anthony, S.1
-
7
-
-
33846183559
-
Does information security attack frequency increase with vulnerability disclosure: An empircal analysis
-
A. Arora, A. Nandkumar, and R. Telang. Does information security attack frequency increase with vulnerability disclosure: An empircal analysis. Information Systems Frontiers, 8(5):350-362, 2006.
-
(2006)
Information Systems Frontiers
, vol.8
, Issue.5
, pp. 350-362
-
-
Arora, A.1
Nandkumar, A.2
Telang, R.3
-
8
-
-
61849175198
-
Optimal policy for software vulnerability disclosure
-
A. Arora, R. Telang, and H. Xu. Optimal policy for software vulnerability disclosure. Management Science, 54(4):642-656, 2008.
-
(2008)
Management Science
, vol.54
, Issue.4
, pp. 642-656
-
-
Arora, A.1
Telang, R.2
Xu, H.3
-
9
-
-
79956063140
-
Who should be responsible for software security? a comparative analysis of liability policies in network environments
-
T. August and T. I. Tunca. Who should be responsible for software security? a comparative analysis of liability policies in network environments. Management Science, 57(5):934-959, 2011.
-
(2011)
Management Science
, vol.57
, Issue.5
, pp. 934-959
-
-
August, T.1
Tunca, T.I.2
-
12
-
-
84983552576
-
An emerging US (and world) threat: Cities wide open to cyber attacks
-
C. Cerrudo. An emerging US (and world) threat: Cities wide open to cyber attacks. IOActive White Paper, 2015.
-
(2015)
IOActive White Paper
-
-
Cerrudo, C.1
-
14
-
-
79960596666
-
The political economy of fiscal deficits: A survey
-
M. Eslava. The political economy of fiscal deficits: A survey. Journal of Economic Surveys, 25(4):645-673, 2011.
-
(2011)
Journal of Economic Surveys
, vol.25
, Issue.4
, pp. 645-673
-
-
Eslava, M.1
-
15
-
-
85076311227
-
An empirical study of vulnerability reward programs
-
August 14-16, Washington, D.C
-
M. Finifter, D. Akhawe, and D. Wagner. An empirical study of vulnerability reward programs. In Proceedings of the 22nd USENIX conference on Security, pages 273-288, Washington, D.C., August 14-16 2013.
-
(2013)
Proceedings of the 22nd USENIX Conference on Security
, pp. 273-288
-
-
Finifter, M.1
Akhawe, D.2
Wagner, D.3
-
16
-
-
84942517822
-
The known unknowns: Empirical analyais of publicly unknown security vulnerabilities
-
December
-
S. Frei. The known unknowns: Empirical analyais of publicly unknown security vulnerabilities. NSS Labs, December 2013.
-
(2013)
NSS Labs
-
-
Frei, S.1
-
17
-
-
84978447148
-
International vulnerability purchase program: Why buying all vulnerabilities above black market prices is economically sound
-
December
-
S. Frei and F. Artes. International vulnerability purchase program: Why buying all vulnerabilities above black market prices is economically sound. NSS Labs, December 2013.
-
(2013)
NSS Labs
-
-
Frei, S.1
Artes, F.2
-
18
-
-
85084160169
-
Green lights forever: Analyzing the security of trafic infrastructure
-
San Diego, CA August 19
-
B. Ghena, W. Beyer, A. Hillaker, J. Pevarnek, and J. A. Halderman. Green lights forever: Analyzing the security of trafic infrastructure. In WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies, pages 7-7, San Diego, CA, August 19 2014.
-
(2014)
WOOT'14 Proceedings of the 8th USENIX Conference on Offensive Technologies
, pp. 7
-
-
Ghena, B.1
Beyer, W.2
Hillaker, A.3
Pevarnek, J.4
Halderman, J.A.5
-
21
-
-
84954189434
-
An empirical analysis of contemporary android mobile vulnerability market
-
New York, NY, June 27-July 2 2015
-
K. Huang, J. Zhang, W. Tan, and Z. Feng. An empirical analysis of contemporary android mobile vulnerability market. In Proceedings of the 2015 IEEE International Conference on Mobile Services (MS), pages 182-189, New York, NY, June 27-July 2 2015.
-
Proceedings of the 2015 IEEE International Conference on Mobile Services (MS)
, pp. 182-189
-
-
Huang, K.1
Zhang, J.2
Tan, W.3
Feng, Z.4
-
22
-
-
84944090355
-
Lights off! the darkness of the smart meters
-
October 14-17
-
A. G. Illera and J. V. Vidal. Lights off! The darkness of the smart meters. Black-hat Europe, October 14-17 2014.
-
(2014)
Black-hat Europe
-
-
Illera, A.G.1
Vidal, J.V.2
-
23
-
-
67650114104
-
Seasonal variation in the vulnerability discovery process
-
Denver, CO April 1-4
-
H. Joh and Y. Malaiya. Seasonal variation in the vulnerability discovery process. In Proceedings of ICST '09, International Conference on Software Testing Verification and Validation, pages 191-200, Denver, CO, April 1-4 2009.
-
(2009)
Proceedings of ICST 09, International Conference on Software Testing Verification and Validation
, pp. 191-200
-
-
Joh, H.1
Malaiya, Y.2
-
25
-
-
84905000417
-
Towards an effective framework for building smart cities: Lessons from Seoul and San Francisco
-
November
-
J. H. Lee, M. G. Hancock, and M.-C. Hu. Towards an effective framework for building smart cities: Lessons from Seoul and San Francisco. Technological Forecasting and Social Change, 89:80-99, November 2014.
-
(2014)
Technological Forecasting and Social Change
, vol.89
, pp. 80-99
-
-
Lee, J.H.1
Hancock, M.G.2
Hu, M.-C.3
-
26
-
-
84978745807
-
Private market growing for zero-day exploits and vulnerabilities
-
November
-
R. Lemos. Private market growing for zero-day exploits and vulnerabilities. TechTarget, November 2012.
-
(2012)
TechTarget
-
-
Lemos, R.1
-
27
-
-
0033451088
-
Evidence of under-investment in energy R&D in the United States and the impact of federal policy
-
R. M. Margolis and D. M. Kammen. Evidence of under-investment in energy R&D in the United States and the impact of federal policy. Energy Policy, 27:575-584, 1999.
-
(1999)
Energy Policy
, vol.27
, pp. 575-584
-
-
Margolis, R.M.1
Kammen, D.M.2
-
30
-
-
84897046373
-
A large-scale empirical study on software reuse in mobile apps
-
I. J. Mojica, B. Adams, M. Nagappan, S. Dienst, T. Berger, and A. E. Hassan. A large-scale empirical study on software reuse in mobile apps. IEEE Software, 31:78-86, 2014.
-
(2014)
IEEE Software
, vol.31
, pp. 78-86
-
-
Mojica, I.J.1
Adams, B.2
Nagappan, M.3
Dienst, S.4
Berger, T.5
Hassan, A.E.6
-
31
-
-
0000058335
-
The political business cycle
-
April
-
W. D. Nordhaus. The political business cycle. Review of Economic Studies, 42(2):169-190, April 1975.
-
(1975)
Review of Economic Studies
, vol.42
, Issue.2
, pp. 169-190
-
-
Nordhaus, W.D.1
-
32
-
-
84952052459
-
Nations buying as hackers sell aws in computer code
-
July 13
-
N. Perlroth and D. E. Sanger. Nations buying as hackers sell aws in computer code. The New York Times, July 13 2013.
-
(2013)
The New York Times
-
-
Perlroth, N.1
Sanger, D.E.2
-
33
-
-
77955132888
-
Why measuring security is hard
-
July/August
-
S. Peeger and R. Cunningham. Why measuring security is hard. IEEE Security & Privacy, 8(4):46-54, July/August 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, Issue.4
, pp. 46-54
-
-
Peeger, S.1
Cunningham, R.2
-
34
-
-
84884138082
-
Are markets for vulnerabilities effective?
-
March
-
S. Ransbotham, S. Mitra, and J. Ramsey. Are markets for vulnerabilities effective? MIS Quarterly, 36(1):43-64, March, 2012.
-
(2012)
MIS Quarterly
, vol.36
, Issue.1
, pp. 43-64
-
-
Ransbotham, S.1
Mitra, S.2
Ramsey, J.3
-
35
-
-
84978753500
-
So you want to be a zero day exploit millionaire?
-
November 10
-
M. J. Schwartz. So you want to be a zero day exploit millionaire? InformationWeek, November 10 2011.
-
(2011)
InformationWeek
-
-
Schwartz, M.J.1
-
36
-
-
77949757281
-
Tort liability for vendors of insecure software: Has the time finally come?
-
M. D. Scott. Tort liability for vendors of insecure software: Has the time finally come? Maryland Law Review, 67(2):425-484, 2008.
-
(2008)
Maryland Law Review
, vol.67
, Issue.2
, pp. 425-484
-
-
Scott, M.D.1
|