-
3
-
-
84861019658
-
Security in the internet of things: A review
-
March
-
H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A review, " in Proc. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, vol. 3, March 2012, pp. 648-651.
-
(2012)
Proc. Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on
, vol.3
, pp. 648-651
-
-
Suo, H.1
Wan, J.2
Zou, C.3
Liu, J.4
-
5
-
-
77950564668
-
The compliance budget: Managing security behaviour in organisations
-
New York, NY, USA: ACM
-
A. Beautement, M. A. Sasse, and M. Wonham, "The compliance budget: Managing security behaviour in organisations, " in Proceedings of the 2008 Workshop on New Security Paradigms (NSPW). New York, NY, USA: ACM, 2008, pp. 47-58.
-
(2008)
Proceedings of the 2008 Workshop on New Security Paradigms (NSPW)
, pp. 47-58
-
-
Beautement, A.1
Sasse, M.A.2
Wonham, M.3
-
6
-
-
42149161709
-
The psychology of security
-
Apr.
-
R. West, "The psychology of security, " Commun. ACM, vol. 51, no. 4, pp. 34-40, Apr. 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.4
, pp. 34-40
-
-
West, R.1
-
7
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
J. D'Arcy, A. Hovav, and D. Galletta, "User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach, " Information Systems Research, vol. 20, no. 1, pp. 79-98, 2009.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'Arcy, J.1
Hovav, A.2
Galletta, D.3
-
8
-
-
77957909604
-
Modelling the human and technological costs and benefits of USB memory stick security
-
M. Johnson, Ed. Springer US
-
A. Beautement, R. Coles, J. Griffin, C. Ioannidis, B. Monahan, D. Pym, A. Sasse, and M. Wonham, "Modelling the human and technological costs and benefits of USB memory stick security, " in Managing Information Risk and the Economics of Security, M. Johnson, Ed. Springer US, 2009, pp. 141-163.
-
(2009)
Managing Information Risk and the Economics of Security
, pp. 141-163
-
-
Beautement, A.1
Coles, R.2
Griffin, J.3
Ioannidis, C.4
Monahan, B.5
Pym, D.6
Sasse, A.7
Wonham, M.8
-
10
-
-
77956652072
-
Human factors in information security: The insider threat-who can you trust these days?
-
C. Colwill, "Human factors in information security: The insider threat-who can you trust these days?" Information Security Technical Report, vol. 14, no. 4, pp. 186-196, 2009.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.4
, pp. 186-196
-
-
Colwill, C.1
-
11
-
-
45749124001
-
The psychology of security
-
S. Vaudenay, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg
-
B. Schneier, "The psychology of security, " in Proc. Progress in Cryptology: First International Conference on Cryptology in Africa (AFRICACRYPT), S. Vaudenay, Ed., vol. 5023. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 50-79.
-
(2008)
Proc. Progress in Cryptology: First International Conference on Cryptology in Africa (AFRICACRYPT)
, vol.5023
, pp. 50-79
-
-
Schneier, B.1
-
12
-
-
0043232732
-
Users are not the enemy
-
Dec.
-
A. Adams and M. A. Sasse, "Users are not the enemy, " Commun. ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
13
-
-
84899540969
-
Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?
-
Mar.
-
W. Sanders, "Quantitative security metrics: Unattainable holy grail or a vital breakthrough within our reach?" IEEE Security and Privacy, vol. 12, no. 2, pp. 67-69, Mar. 2014.
-
(2014)
IEEE Security and Privacy
, vol.12
, Issue.2
, pp. 67-69
-
-
Sanders, W.1
-
15
-
-
70350630540
-
An information security ontology incorporating human-behavioural implications
-
New York, NY, USA: ACM
-
S. E. Parkin, A. van Moorsel, and R. Coles, "An information security ontology incorporating human-behavioural implications, " in Proceedings of the International Conference on Security of Information and Networks (SIN). New York, NY, USA: ACM, 2009, pp. 46-55.
-
(2009)
Proceedings of the International Conference on Security of Information and Networks (SIN)
, pp. 46-55
-
-
Parkin, S.E.1
Van Moorsel, A.2
Coles, R.3
-
16
-
-
44649188693
-
The impact of unavailability on the effectiveness of enterprise information security technologies
-
T. Nanya, F. Maruyama, A. Pataricza, and M. Malek, Eds. Springer Berlin Heidelberg
-
S. E. Parkin, R. Yassin Kassab, and A. van Moorsel, "The impact of unavailability on the effectiveness of enterprise information security technologies, " in Proc. Service Availability: 5th International Service Availability Symposium (ISAS), T. Nanya, F. Maruyama, A. Pataricza, and M. Malek, Eds., vol. 5017. Springer Berlin Heidelberg, 2008, pp. 43-58.
-
(2008)
Proc. Service Availability: 5th International Service Availability Symposium (ISAS)
, vol.5017
, pp. 43-58
-
-
Parkin, S.E.1
Yassin Kassab, R.2
Van Moorsel, A.3
-
17
-
-
24644470542
-
The insider threat to information systems and the effectiveness of ISO17799
-
M. Theoharidou, S. Kokolakis, M. Karyda, and E. Kiountouzis, "The insider threat to information systems and the effectiveness of ISO17799, " Computers & Security, vol. 24, no. 6, pp. 472-484, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 472-484
-
-
Theoharidou, M.1
Kokolakis, S.2
Karyda, M.3
Kiountouzis, E.4
-
18
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
T. Herath and H. Rao, "Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness, " Decision Support Systems, vol. 47, no. 2, pp. 154-165, 2009.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 154-165
-
-
Herath, T.1
Rao, H.2
-
19
-
-
33646679400
-
To download or not to download: An examination of computer security decision making
-
May
-
J. B. Hardee, R. West, and C. B. Mayhorn, "To download or not to download: An examination of computer security decision making, " ACM interactions, vol. 13, no. 3, pp. 32-37, May 2006.
-
(2006)
ACM Interactions
, vol.13
, Issue.3
, pp. 32-37
-
-
Hardee, J.B.1
West, R.2
Mayhorn, C.B.3
-
20
-
-
84856018908
-
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
-
P. Ifinedo, "Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory, " Computers & Security, vol. 31, no. 1, pp. 83-95, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.1
, pp. 83-95
-
-
Ifinedo, P.1
-
21
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
B. Bulgurcu, H. Cavusoglu, and I. Benbasat, "Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness, " MIS Quarterly, vol. 34, no. 3, pp. 523-548, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
22
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow is security policies
-
J.-Y. Son, "Out of fear or desire? toward a better understanding of employees' motivation to follow IS security policies, " Information & Management, vol. 48, no. 7, pp. 296-302, 2011.
-
(2011)
Information & Management
, vol.48
, Issue.7
, pp. 296-302
-
-
Son, J.-Y.1
-
23
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
A. C. Johnston and M. Warkentin, "Fear appeals and information security behaviors: An empirical study, " MIS quarterly, vol. 34, no. 3, pp. 549-566, 2010.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.C.1
Warkentin, M.2
-
24
-
-
61349092288
-
Studying users' computer security behavior: A health belief perspective
-
B.-Y. Ng, A. Kankanhalli, and Y. C. Xu, "Studying users' computer security behavior: A health belief perspective, " Decision Support Systems, vol. 46, no. 4, pp. 815-825, 2009.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
Ng, B.-Y.1
Kankanhalli, A.2
Xu, Y.C.3
-
25
-
-
0036064934
-
A holistic model of computer abuse within organizations
-
J. Lee and Y. Lee, "A holistic model of computer abuse within organizations, " Information Management & Computer Security, vol. 10, no. 2, pp. 57-63, 2002.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 57-63
-
-
Lee, J.1
Lee, Y.2
-
26
-
-
84944319215
-
Stochastic activity networks: Formal definitions and concepts
-
E. Brinksma, H. Hermanns, and J.-P. Katoen, Eds. Springer Berlin Heidelberg
-
W. H. Sanders and J. F. Meyer, "Stochastic activity networks: Formal definitions and concepts, " in Lectures on Formal Methods and Performance Analysis, ser. Lecture Notes in Computer Science, E. Brinksma, H. Hermanns, and J.-P. Katoen, Eds., vol. 2090. Springer Berlin Heidelberg, 2001, pp. 315-343.
-
(2001)
Lectures on Formal Methods and Performance Analysis, Ser. Lecture Notes in Computer Science
, vol.2090
, pp. 315-343
-
-
Sanders, W.H.1
Meyer, J.F.2
-
27
-
-
84957801459
-
The Möbius modeling tool
-
G. Clark, T. Courtney, D. Daly, D. Deavours, S. Derisavi, J. M. Doyle, W. H. Sanders, and P. Webster, "The Möbius modeling tool, " in Proc. Petri Nets and Performance Models, 2001. 9th International Workshop on, 2001, pp. 241-250.
-
(2001)
Proc. Petri Nets and Performance Models, 2001. 9th International Workshop on
, pp. 241-250
-
-
Clark, G.1
Courtney, T.2
Daly, D.3
Deavours, D.4
Derisavi, S.5
Doyle, J.M.6
Sanders, W.H.7
Webster, P.8
-
28
-
-
85076274968
-
Measuring real-world accuracies and biases in modeling password guessability
-
Washington, D. C.: USENIX Association, Aug.
-
B. Ur, S. M. Segreti, L. Bauer, N. Christin, L. F. Cranor, S. Komanduri, D. Kurilova, M. L. Mazurek, W. Melicher, and R. Shay, "Measuring real-world accuracies and biases in modeling password guessability, " in Proc. 24th USENIX Security Symposium (USENIX Security 15). Washington, D. C.: USENIX Association, Aug. 2015, pp. 463-481.
-
(2015)
Proc. 24th USENIX Security Symposium (USENIX Security 15)
, pp. 463-481
-
-
Ur, B.1
Segreti, S.M.2
Bauer, L.3
Christin, N.4
Cranor, L.F.5
Komanduri, S.6
Kurilova, D.7
Mazurek, M.L.8
Melicher, W.9
Shay, R.10
-
29
-
-
34250767745
-
Human selection of mnemonic phrase-based passwords
-
New York, NY, USA: ACM
-
C. Kuo, S. Romanosky, and L. F. Cranor, "Human selection of mnemonic phrase-based passwords, " in Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS). New York, NY, USA: ACM, 2006, pp. 67-78.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS)
, pp. 67-78
-
-
Kuo, C.1
Romanosky, S.2
Cranor, L.F.3
-
30
-
-
84902270476
-
Unintentional insider threat: Contributing factors, observables, and mitigation strategies
-
Jan.
-
F. Greitzer, J. Strozer, S. Cohen, J. Bergey, J. Cowley, A. Moore, and D. Mundie, "Unintentional insider threat: Contributing factors, observables, and mitigation strategies, " in Proc. System Sciences (HICSS), 2014 47th Hawaii International Conference on, Jan. 2014, pp. 2025-2034.
-
(2014)
Proc. System Sciences (HICSS), 2014 47th Hawaii International Conference on
, pp. 2025-2034
-
-
Greitzer, F.1
Strozer, J.2
Cohen, S.3
Bergey, J.4
Cowley, J.5
Moore, A.6
Mundie, D.7
-
33
-
-
12344275676
-
Model-based evaluation: From dependability to security
-
Jan.
-
D. M. Nicol, W. H. Sanders, and K. S. Trivedi, "Model-based evaluation: from dependability to security, " Dependable and Secure Computing, IEEE Transactions on, vol. 1, no. 1, pp. 48-65, Jan. 2004.
-
(2004)
Dependable and Secure Computing, IEEE Transactions on
, vol.1
, Issue.1
, pp. 48-65
-
-
Nicol, D.M.1
Sanders, W.H.2
Trivedi, K.S.3
-
34
-
-
33747205462
-
On the brittleness of software and the infeasibility of security metrics
-
S. M. Bellovin, "On the brittleness of software and the infeasibility of security metrics, " IEEE Security & Privacy, vol. 4, no. 4, p. 96, 2006.
-
(2006)
IEEE Security & Privacy
, vol.4
, Issue.4
, pp. 96
-
-
Bellovin, S.M.1
-
35
-
-
38949137343
-
Estimating a system's mean time-tocompromise
-
Jan.
-
D. Leversage and E. James, "Estimating a system's mean time-tocompromise, " IEEE Security & Privacy, vol. 6, no. 1, pp. 52-60, Jan. 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.1
, pp. 52-60
-
-
Leversage, D.1
James, E.2
-
36
-
-
0002670359
-
Attack trees
-
B. Schneier, "Attack trees, " Dr. Dobbs Journal, vol. 24, no. 12, pp. 21-29, 1999.
-
(1999)
Dr. Dobbs Journal
, vol.24
, Issue.12
, pp. 21-29
-
-
Schneier, B.1
-
37
-
-
80055043688
-
Model-based security metrics using ADversary VIew Security Evaluation (ADVISE)
-
Sept.
-
E. LeMay, M. D. Ford, K. Keefe, W. H. Sanders, and C. Muehrcke, "Model-based security metrics using ADversary VIew Security Evaluation (ADVISE), " in Quantitative Evaluation of Systems (QEST), 2011 Eighth International Conference on, Sept. 2011, pp. 191-200.
-
(2011)
Quantitative Evaluation of Systems (QEST), 2011 Eighth International Conference on
, pp. 191-200
-
-
LeMay, E.1
Ford, M.D.2
Keefe, K.3
Sanders, W.H.4
Muehrcke, C.5
-
39
-
-
0242557008
-
DoD modeling and simulation (M&S) verification, validation, and accreditation (VV&A)
-
Tech. Rep.
-
P. Sanders, "DoD modeling and simulation (M&S) verification, validation, and accreditation (VV&A), " DTIC Document, Tech. Rep., 1996.
-
(1996)
DTIC Document
-
-
Sanders, P.1
-
40
-
-
0037076425
-
Agent-based modeling: Methods and techniques for simulating human systems
-
E. Bonabeau, "Agent-based modeling: Methods and techniques for simulating human systems, " Proceedings of the National Academy of Sciences, vol. 99, no. suppl 3, pp. 7280-7287, 2002.
-
(2002)
Proceedings of the National Academy of Sciences
, vol.99
, pp. 7280-7287
-
-
Bonabeau, E.1
|