-
1
-
-
79956063140
-
Who should be responsible for software security? A comparative analysis of liability policies in network environments
-
August T, Tunca TI (2011) Who should be responsible for software security? A comparative analysis of liability policies in network environments. Management Sci. 57(5):934-959
-
(2011)
Management Sci
, vol.57
, Issue.5
, pp. 934-959
-
-
August, T.1
Tunca, T.I.2
-
2
-
-
84907576490
-
Cloud implications on software network structure and security risks
-
August T, Niculescu MF, Shin H (2014) Cloud implications on software network structure and security risks. Inform. Systems Res. 25(3):499-510
-
(2014)
Inform. Systems Res
, vol.25
, Issue.3
, pp. 499-510
-
-
August, T.1
Niculescu, M.F.2
Shin, H.3
-
3
-
-
0003516333
-
-
Technical Report 99-15 Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden
-
Axelsson S (2000) Intrusion detection systems: A taxonomy and survey. Technical Report 99-15 Department of Computer Engineering, Chalmers University of Technology, Gothenburg, Sweden
-
(2000)
Intrusion detection systems: A taxonomy and survey
-
-
Axelsson, S.1
-
4
-
-
85010324776
-
False positive responses optimization for intrusion detection system
-
Baayer J, Regragui B, Baayer A (2014) False positive responses optimization for intrusion detection system. J. Inform. Security 5(2):19-36
-
(2014)
J. Inform. Security
, vol.5
, Issue.2
, pp. 19-36
-
-
Baayer, J.1
Regragui, B.2
Baayer, A.3
-
5
-
-
84892369906
-
A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes
-
Bai X, Gopal R, Nunez M, Zhdanov D (2014) A decision methodology for managing operational efficiency and information disclosure risk in healthcare processes. Decision Support Systems 57(1):406-416
-
(2014)
Decision Support Systems
, vol.57
, Issue.1
, pp. 406-416
-
-
Bai, X.1
Gopal, R.2
Nunez, M.3
Zhdanov, D.4
-
8
-
-
0041851517
-
A model ofWeb site browsing behavior estimated on clickstream data
-
Bucklin R, Sismeiro C (2003) A model ofWeb site browsing behavior estimated on clickstream data. J. Marketing Res. 40(3):249-267
-
(2003)
J. Marketing Res
, vol.40
, Issue.3
, pp. 249-267
-
-
Bucklin, R.1
Sismeiro, C.2
-
9
-
-
33947373662
-
Economics of IT security management: Four improvements to current security practices
-
Cavusoglu H, Cavusoglu H, Raghunathan S (2004a) Economics of IT security management: Four improvements to current security practices. Comm. Assoc. Inform. Systems 14(3):65-75
-
(2004)
Comm. Assoc. Inform. Systems
, vol.14
, Issue.3
, pp. 65-75
-
-
Cavusoglu, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
10
-
-
77958482604
-
An analysis of the impact of passenger profiling for transportation security
-
Cavusoglu H, Koh B, Raghunathan S (2010) An analysis of the impact of passenger profiling for transportation security. Oper. Res. 158(5):1287-1302
-
(2010)
Oper. Res
, vol.158
, Issue.5
, pp. 1287-1302
-
-
Cavusoglu, H.1
Koh, B.2
Raghunathan, S.3
-
11
-
-
4243109556
-
A model for evaluating IT security investments
-
Cavusoglu H, Mishra B, Raghunathan S (2004b) A model for evaluating IT security investments. Comm. ACM 47(7):87-92
-
(2004)
Comm. ACM
, vol.47
, Issue.7
, pp. 87-92
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
12
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H, Mishra B, Raghunathan S (2005) The value of intrusion detection systems in information technology security architecture. Inform. Systems Res. 16(1):28-46
-
(2005)
Inform. Systems Res
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
13
-
-
67649529385
-
Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems
-
Cavusoglu H, Raghunathan S, Cavusoglu H (2009) Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems. Inform. Systems Res. 20(2):198-217
-
(2009)
Inform. Systems Res
, vol.20
, Issue.2
, pp. 198-217
-
-
Cavusoglu, H.1
Raghunathan, S.2
Cavusoglu, H.3
-
14
-
-
66549093519
-
Decision-theoretic and game-theoretic approaches to IT security investment
-
Cavusoglu H, Raghunathan S, Yue WT (2008) Decision-theoretic and game-theoretic approaches to IT security investment. J. Management Inform. Systems 25(2):281-304
-
(2008)
J. Management Inform. Systems
, vol.25
, Issue.2
, pp. 281-304
-
-
Cavusoglu, H.1
Raghunathan, S.2
Yue, W.T.3
-
15
-
-
84897080478
-
Outsourcing information security: Contracting issues and security implications
-
Cezar A, Cavusoglu H, Raghunathan S (2014) Outsourcing information security: Contracting issues and security implications. Management Sci. 60(3):638-657
-
(2014)
Management Sci
, vol.60
, Issue.3
, pp. 638-657
-
-
Cezar, A.1
Cavusoglu, H.2
Raghunathan, S.3
-
17
-
-
0242539674
-
World wide wait: A study of Internet scalability and cache-based approaches to alleviate it
-
Datta A, Dutta K, Thomas H, VanderMeet D (2003)World wide wait: A study of Internet scalability and cache-based approaches to alleviate it. Management Sci. 49(10):1425-1444
-
(2003)
Management Sci
, vol.49
, Issue.10
, pp. 1425-1444
-
-
Datta, A.1
Dutta, K.2
Thomas, H.3
VanderMeet, D.4
-
18
-
-
85010308893
-
-
Dell (2015) Going the MSSP route. http://www.secureworks.com/assets/pdf-store/articles/going_the_mssp_route_-_tco_issues .pdf
-
(2015)
Going the MSSP route
-
-
-
19
-
-
33744922914
-
Outsourcing Internet security: The effect of transaction costs on managed service providers
-
Gavish B, ed. (Institute for Information Infrastructure Protection, Washington, DC)
-
Ding W, Yurcik W (2005) Outsourcing Internet security: The effect of transaction costs on managed service providers. Gavish B, ed. Internat. Conf. Telecomm. Systems, Modeling, Anal. (Institute for Information Infrastructure Protection, Washington, DC), 947-958
-
(2005)
Internat. Conf. Telecomm. Systems, Modeling, Anal
, pp. 947-958
-
-
Ding, W.1
Yurcik, W.2
-
20
-
-
85018485578
-
Economics of Internet security outsourcing: Simulation results based on the Schneier model
-
(American Telecommunications Systems Management Association, Dallas)
-
Ding W, Yurcik W (2006) Economics of Internet security outsourcing: Simulation results based on the Schneier model. Workshop Econom. Securing Inform. Infrastructure 4WESII5 (American Telecommunications Systems Management Association, Dallas), 23-23
-
(2006)
Workshop Econom. Securing Inform. Infrastructure 4WESII5
, pp. 23-23
-
-
Ding, W.1
Yurcik, W.2
-
23
-
-
33745725716
-
A data-mining-based prefetching approach to caching for network storage systems
-
Fang X, Sheng LOR, Gao W, Iyer B (2006) A data-mining-based prefetching approach to caching for network storage systems. INFORMS J. Comput. 18(2):267-282
-
(2006)
INFORMS J. Comput
, vol.18
, Issue.2
, pp. 267-282
-
-
Fang, X.1
Sheng, L.O.R.2
Gao, W.3
Iyer, B.4
-
24
-
-
33749044955
-
The Markov-modulated Poisson process (MMPP) cookbook
-
Fisher W, Meier-Hellstern K (1993) The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation 18(2): 149-171
-
(1993)
Performance Evaluation
, vol.18
, Issue.2
, pp. 149-171
-
-
Fisher, W.1
Meier-Hellstern, K.2
-
26
-
-
34247541615
-
Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information
-
Garfinkel R, Gopal R, Thompson S (2007) Releasing individually identifiable microdata with privacy protection against stochastic threat: An application to health information. Inform. Systems Res. 18(1):23-41
-
(2007)
Inform. Systems Res
, vol.18
, Issue.1
, pp. 23-41
-
-
Garfinkel, R.1
Gopal, R.2
Thompson, S.3
-
28
-
-
21644478019
-
I know my network: Collaboration and expertise in intrusion detection
-
Herbsleb J, Olson G, eds. (ACM, New York)
-
Goodall JR, Lutters WG, Komlodi A (2004) I know my network: Collaboration and expertise in intrusion detection. Herbsleb J, Olson G, eds. Proc. 2004 ACM Conf. Comput. Supported Cooperative Work (ACM, New York), 342-345
-
(2004)
Proc. 2004 ACM Conf. Comput. Supported Cooperative Work
, pp. 342-345
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
30
-
-
84868029643
-
Growth and sustainability of managed security services networks: An economic perspective
-
Gupta A, Zhdanov D (2012) Growth and sustainability of managed security services networks: An economic perspective. MIS Quart. 36(4):1109-1130
-
(2012)
MIS Quart
, vol.36
, Issue.4
, pp. 1109-1130
-
-
Gupta, A.1
Zhdanov, D.2
-
31
-
-
0037297050
-
Decomposition of general queueing networks with MMPP inputs and customer losses
-
Heindl A (2003) Decomposition of general queueing networks with MMPP inputs and customer losses. Performance Evaluation 51(2-4):117-136
-
(2003)
Performance Evaluation
, vol.51
, Issue.2-4
, pp. 117-136
-
-
Heindl, A.1
-
33
-
-
85010465273
-
-
US Patent US7084760 B2
-
Himberger KD, Jeffries CD, McMillen DM, Ziraldo JA (2006) System, method, and program product for managing an intrusion detection system. US Patent US7084760 B2
-
(2006)
System, method, and program product for managing an intrusion detection system
-
-
Himberger, K.D.1
Jeffries, C.D.2
McMillen, D.M.3
Ziraldo, J.A.4
-
34
-
-
84871694879
-
Cooperative cashing? An economic analysis of document duplication in cooperative Web caching
-
Hosanagar K, Tan Y (2011) Cooperative cashing? An economic analysis of document duplication in cooperative Web caching. Inform. Systems Res. 23(2):356-375
-
(2011)
Inform. Systems Res
, vol.23
, Issue.2
, pp. 356-375
-
-
Hosanagar, K.1
Tan, Y.2
-
35
-
-
84878001717
-
Information security outsourcing with system interdependency and mandatory security requirement
-
Hui KL, Hui W, Yue WT (2012) Information security outsourcing with system interdependency and mandatory security requirement. J. Management Inform. Systems 29(3):117-156
-
(2012)
J. Management Inform. Systems
, vol.29
, Issue.3
, pp. 117-156
-
-
Hui, K.L.1
Hui, W.2
Yue, W.T.3
-
37
-
-
0031123773
-
A quantitative model of the security intrusion process based on attacker behavior
-
Jonsson E, Olovsson T (1997) A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans. Software Engrg. 23(4):235-245
-
(1997)
IEEE Trans. Software Engrg
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
38
-
-
7444248367
-
Outsourcing trends-A matter of perspective? Bus
-
Kaplan J (2003) Outsourcing trends-A matter of perspective? Bus. Comm. Rev. 33(8):46-50
-
(2003)
Comm. Rev
, vol.33
, Issue.8
, pp. 46-50
-
-
Kaplan, J.1
-
40
-
-
57749119172
-
An admission-control technique for delay reduction in proxy caching
-
Kaya C, Zhang G, Tan Y, Mookerjee V (2009) An admission-control technique for delay reduction in proxy caching. Decision Support Systems 46(2):594-603
-
(2009)
Decision Support Systems
, vol.46
, Issue.2
, pp. 594-603
-
-
Kaya, C.1
Zhang, G.2
Tan, Y.3
Mookerjee, V.4
-
41
-
-
0035253950
-
Optimal Web cache sizing: Scalable methods for exact solutions
-
Kelly T, Reeves R (2001) Optimal Web cache sizing: Scalable methods for exact solutions. Comput. Comm. 24(2):163-173
-
(2001)
Comput. Comm
, vol.24
, Issue.2
, pp. 163-173
-
-
Kelly, T.1
Reeves, R.2
-
49
-
-
33645669627
-
A multilevel passenger screening problem for aviation security
-
McLay L, Jacobson S, Kobza J (2006) A multilevel passenger screening problem for aviation security. Naval Res. Logist. 53(3): 183-197
-
(2006)
Naval Res. Logist
, vol.53
, Issue.3
, pp. 183-197
-
-
McLay, L.1
Jacobson, S.2
Kobza, J.3
-
50
-
-
77958463119
-
The trade-off between technology and prescreening intelligence in checked baggage screening for aviation security
-
McLay L, Jacobson S, Kobza J (2008) The trade-off between technology and prescreening intelligence in checked baggage screening for aviation security. J. Transportation Security 1(2):107-126
-
(2008)
J. Transportation Security
, vol.1
, Issue.2
, pp. 107-126
-
-
McLay, L.1
Jacobson, S.2
Kobza, J.3
-
51
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
Mitchell R, Chen I (2014) A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surveys 46(4): Article 55
-
(2014)
ACM Comput. Surveys
, vol.46
, Issue.4
-
-
Mitchell, R.1
Chen, I.2
-
54
-
-
0036508157
-
Analysis of a least recently used cache management policy for Web browsers
-
Mookerjee V, Tan Y (2002) Analysis of a least recently used cache management policy for Web browsers. Oper. Res. 50(2):345-357
-
(2002)
Oper. Res
, vol.50
, Issue.2
, pp. 345-357
-
-
Mookerjee, V.1
Tan, Y.2
-
55
-
-
85095970245
-
Experience with Emerald to date
-
Ranum M, ed. (USENIX, Berkeley, CA)
-
Neumann P, Porras P (1999) Experience with Emerald to date. Ranum M, ed. Proc. 1st USENIX Workshop Intrusion Detection Network Monitoring (USENIX, Berkeley, CA), 73-80
-
(1999)
Proc. 1st USENIX Workshop Intrusion Detection Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
56
-
-
61349169100
-
Intrusion-detection policies for IT security breaches
-
Ogut H, Cavusoglu H, Raghunathan S (2008) Intrusion-detection policies for IT security breaches. INFORMS J. Comput. 20(1): 112-123
-
(2008)
INFORMS J. Comput
, vol.20
, Issue.1
, pp. 112-123
-
-
Ogut, H.1
Cavusoglu, H.2
Raghunathan, S.3
-
57
-
-
34147099073
-
Survey of networkbased defense mechanisms countering the DoS and DDoS problems
-
Peng T, Leckie C, Ramamohanarao K (2007) Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surveys 39(1):Article 3
-
(2007)
ACM Comput. Surveys
, vol.39
, Issue.1
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
59
-
-
3042767592
-
A survey ofWeb cache replacement strategies
-
Podlipnig S, Bszrmenyi L (2003) A survey ofWeb cache replacement strategies. ACM Comput. Surveys 35(4):374-398
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.4
, pp. 374-398
-
-
Podlipnig, S.1
Bszrmenyi, L.2
-
60
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham S, Mitra S (2009) Choice and chance: A conceptual model of paths to information security compromise. Inform. Systems Res. 20(1):121-139
-
(2009)
Inform. Systems Res
, vol.20
, Issue.1
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
61
-
-
84979202997
-
A survey of intrusion detection and prevention techniques
-
(IACSIT Press, Singapore)
-
Sandhu UA, Haider S, Naseer S, Ateeb OU (2011) A survey of intrusion detection and prevention techniques. Internat. Conf. Inform. Comm. Management (IACSIT Press, Singapore), 66-71
-
(2011)
Internat. Conf. Inform. Comm. Management
, pp. 66-71
-
-
Sandhu, U.A.1
Haider, S.2
Naseer, S.3
Ateeb, O.U.4
-
64
-
-
0037004470
-
The case for outsourcing security
-
Schneier B (2002) The case for outsourcing security. IEEE Comput. 35(4):20-26
-
(2002)
IEEE Comput
, vol.35
, Issue.4
, pp. 20-26
-
-
Schneier, B.1
-
67
-
-
84875310665
-
Intrusion detection and the role of the system administrator
-
Sommestad T, Hunstad A (2013) Intrusion detection and the role of the system administrator. Inform. Management Comput. Security 21(1):30-40
-
(2013)
Inform. Management Comput. Security
, vol.21
, Issue.1
, pp. 30-40
-
-
Sommestad, T.1
Hunstad, A.2
-
68
-
-
85010426446
-
-
retail websites in 3rd quarter 2014
-
Statista (2015) Monthly unique visitors to U.S. retail websites in 3rd quarter 2014. http://www.statista.com/statistics/271450/monthly-unique-visitors-to-us-retail-websites/
-
(2015)
Monthly unique visitors to U.S
-
-
-
70
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila JW, Gaffney JE (2004) A decision analysis method for evaluating computer intrusion detection systems. Decision Anal. 1(1):35-50
-
(2004)
Decision Anal
, vol.1
, Issue.1
, pp. 35-50
-
-
Ulvila, J.W.1
Gaffney, J.E.2
-
72
-
-
0141816735
-
Analyzing the cost of screening selectee and non-selectee baggage
-
Virta J, Jacobson S, Kobza J (2003) Analyzing the cost of screening selectee and non-selectee baggage. Risk Anal. 23(5):897-908
-
(2003)
Risk Anal
, vol.23
, Issue.5
, pp. 897-908
-
-
Virta, J.1
Jacobson, S.2
Kobza, J.3
-
73
-
-
64849099080
-
The challenges of using an intrusion detection system: Is it worth the effort? Proc
-
(ACM, New York)
-
Werlinger R, Hawkey K, Muldner K (2008) The challenges of using an intrusion detection system: Is it worth the effort? Proc. 4th Sympos. Usable Privacy Security (ACM, New York), 107-118
-
(2008)
4th Sympos. Usable Privacy Security
, pp. 107-118
-
-
Werlinger, R.1
Hawkey, K.2
Muldner, K.3
-
74
-
-
84875309636
-
Towards understanding diagnostic work during the detection and investigation of security incidents
-
Furnell S, Clarke N, eds. (University of Plymouth, Plymouth, UK)
-
Werlinger R, Muldner K, Hawkey K, Beznosov K (2009) Towards understanding diagnostic work during the detection and investigation of security incidents. Furnell S, Clarke N, eds. Proc. Third Internat. Sympos. Human Aspects Inform. Security Assurance (University of Plymouth, Plymouth, UK), 119-134
-
(2009)
Proc. Third Internat. Sympos. Human Aspects Inform. Security Assurance
, pp. 119-134
-
-
Werlinger, R.1
Muldner, K.2
Hawkey, K.3
Beznosov, K.4
-
75
-
-
77949522891
-
Preparation, detection, and analysis: The diagnostic work of IT security incident response
-
Werlinger R, Muldner K, Hawkey K, Beznosov K (2010) Preparation, detection, and analysis: The diagnostic work of IT security incident response. Inform. Management Comput. Security 18(1):26-42
-
(2010)
Inform. Management Comput. Security
, vol.18
, Issue.1
, pp. 26-42
-
-
Werlinger, R.1
Muldner, K.2
Hawkey, K.3
Beznosov, K.4
-
76
-
-
0002271555
-
Contracting for software development
-
Whang S (1992) Contracting for software development. Management Sci. 38(3):307-324
-
(1992)
Management Sci
, vol.38
, Issue.3
, pp. 307-324
-
-
Whang, S.1
-
77
-
-
85010323197
-
-
Spafford G, ed. Workshop Recent Adv. Intrusion Detection (Purdue University, West Lafayette, IN)
-
Zamboni D, Spafford E (1999) New directions for the AAPHID architecture. Spafford G, ed. Workshop Recent Adv. Intrusion Detection (Purdue University, West Lafayette, IN)
-
(1999)
New directions for the AAPHID architecture
-
-
Zamboni, D.1
Spafford, E.2
-
78
-
-
84883204511
-
Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements
-
Zhao X, Whinston A (2013) Managing interdependent information security risks: Cyberinsurance, managed security services, and risk pooling arrangements. J. Management Inform. Systems 30(1):123-152
-
(2013)
J. Management Inform. Systems
, vol.30
, Issue.1
, pp. 123-152
-
-
Zhao, X.1
Whinston, A.2
|