-
1
-
-
84904194604
-
Large-scale security analysis of the web: Challenges and findings
-
in, Springe
-
Van Goethem T, Chen P, Nikiforakis N, Desmet L, Joosen W. Large-scale security analysis of the web: Challenges and findings. Pp. 110–126 in Trust and Trustworthy Computing. Springer, 2014.
-
(2014)
Trust and Trustworthy Computing
, pp. 110-126
-
-
Van Goethem, T.1
Chen, P.2
Nikiforakis, N.3
Desmet, L.4
Joosen, W.5
-
2
-
-
50249085983
-
An attack graph-based probabilistic security metric
-
in, of Lecture Notes in Computer Science., Springer Berlin/Heidelber
-
Wang L, Islam T, Long T, Singhal A, Jajodia S. An attack graph-based probabilistic security metric. Pp. 283–296 in Proceedings of the 22nd IFIP WG 11.3 Working Conference on Data and Applications Security. Vol. 5094 of Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2008.
-
(2008)
Proceedings of the 22nd IFIP WG 11.3 Working Conference on Data and Applications Security
, vol.5094
, pp. 283-296
-
-
Wang, L.1
Islam, T.2
Long, T.3
Singhal, A.4
Jajodia, S.5
-
3
-
-
80051749786
-
Correlated failures, diversification, and information security risk management
-
Chen Py, Kataria G, Krishnan R. Correlated failures, diversification, and information security risk management. MIS Quarterly: Management Information Systems, 2011; 35(2): 397–422.
-
(2011)
MIS Quarterly: Management Information Systems
, vol.35
, Issue.2
, pp. 397-422
-
-
Chen, P.1
Kataria, G.2
Krishnan, R.3
-
4
-
-
3042755044
-
How useful is quantitative risk assessment
-
Apostolakis GE. How useful is quantitative risk assessment? Risk Analysis, 2004; 24(3):515–520.
-
(2004)
Risk Analysis
, vol.24
, Issue.3
, pp. 515-520
-
-
Apostolakis, G.E.1
-
6
-
-
18944385964
-
The value of intrusion detection systems in information technology security architecture
-
Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture. Information Systems Research, 2005; 16(1):28–46.
-
(2005)
Information Systems Research
, vol.16
, Issue.1
, pp. 28-46
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
8
-
-
84976263015
-
Supervised aggregative feature extraction for big data time series regression
-
Susto GA, Schirru A, Pampuri S, McLoone S. Supervised aggregative feature extraction for big data time series regression. IEEE Transactions on Industrial Informatics, 2016; 12(3):1243–1252.
-
(2016)
IEEE Transactions on Industrial Informatics
, vol.12
, Issue.3
, pp. 1243-1252
-
-
Susto, G.A.1
Schirru, A.2
Pampuri, S.3
McLoone, S.4
-
9
-
-
21944457574
-
Comprehensive approach to intrusion detection alert correlation
-
Valeur F, Vigna G, Kruegel C, Kemmerer RA. Comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing, 2004; 1(3):146–169.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
12
-
-
85027409843
-
-
OSVDB,, Accessed November 2016
-
Martin B. A note on the Verizon DBIR 2016 vulnerabilities claims. OSVDB, 2016. https://doi.org/blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/. Available at: https://doi.org/blog.osvdb.org/2016/04/27/a-note-on-the-verizon-dbir-2016-vulnerabilities-claims/, Accessed November 2016.
-
(2016)
A note on the Verizon DBIR 2016 vulnerabilities claims
-
-
Martin, B.1
-
14
-
-
42249094900
-
What's wrong with risk matrices
-
Anthony Tony Cox L. What's wrong with risk matrices? Risk Analysis, 2008; 28(2):497–512.
-
(2008)
Risk Analysis
, vol.28
, Issue.2
, pp. 497-512
-
-
Anthony Tony Cox, L.1
-
15
-
-
84924567598
-
Recommendations on the use and design of risk matrices
-
Duijm NJ. Recommendations on the use and design of risk matrices. Safety Science, 2015; 76:21–31.
-
(2015)
Safety Science
, vol.76
, pp. 21-31
-
-
Duijm, N.J.1
-
18
-
-
77955425114
-
Quantifying security risk level from CVSS estimates of frequency and impact
-
Houmb SH, Franqueira VN, Engum EA. Quantifying security risk level from CVSS estimates of frequency and impact. Journal of Systems and Software, 2010; 83(9):1622–1634.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.9
, pp. 1622-1634
-
-
Houmb, S.H.1
Franqueira, V.N.2
Engum, E.A.3
-
22
-
-
84928107846
-
Security triage: A report of a lean security requirements methodology for cost-effective security analysis
-
i
-
Giacalone M, Mammoliti R, Massacci F, Paci F, Perugino R, Selli C. Security triage: A report of a lean security requirements methodology for cost-effective security analysis. Pp. 25–27 in Proc. of ACM/IEE ESEM'14, 2014.
-
(2014)
Proc. of ACM/IEE ESEM'14
, pp. 25-27
-
-
Giacalone, M.1
Mammoliti, R.2
Massacci, F.3
Paci, F.4
Perugino, R.5
Selli, C.6
-
23
-
-
84946126337
-
A review of cyber security risk assessment methods for SCADA systems
-
Cherdantseva Y, Burnap P, Blyth A, Eden P, Jones K, Soulsby H, et al. A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 2016; 56:1–27.
-
(2016)
Computers & Security
, vol.56
, pp. 1-27
-
-
Cherdantseva, Y.1
Burnap, P.2
Blyth, A.3
Eden, P.4
Jones, K.5
Soulsby, H.6
-
24
-
-
0036668726
-
Risk analysis and risk management in an uncertain world
-
Accessed April 2017
-
Kunreuther H. Risk analysis and risk management in an uncertain world. Risk Analysis, 2002; 22(4):655–664. Available at: https://doi.org/10.1111/0272-4332.00057, Accessed April 2017.
-
(2002)
Risk Analysis
, vol.22
, Issue.4
, pp. 655-664
-
-
Kunreuther, H.1
-
25
-
-
84979305344
-
Best practices for building a security operations center
-
Kelley D, Moritz R. Best practices for building a security operations center. Information Systems Security, 2006; 14(6): 27–32.
-
(2006)
Information Systems Security
, vol.14
, Issue.6
, pp. 27-32
-
-
Kelley, D.1
Moritz, R.2
-
26
-
-
84890854996
-
-
1–7 in, Venter HS, Loock M, Coetzee M, (eds). 2013 Information Security for South Africa., Johannesburg, South Africa, IEE
-
Jacobs P, Arnab A, Irwin B. Classification of security operation centers. Pp. 1–7 in Venter HS, Loock M, Coetzee M (eds). 2013 Information Security for South Africa. Johannesburg, South Africa: IEEE, 2013.
-
(2013)
Classification of security operation centers
-
-
Jacobs, P.1
Arnab, A.2
Irwin, B.3
-
27
-
-
79953037043
-
On some recent definitions and analysis frameworks for risk, vulnerability, and resilience
-
Aven T. On some recent definitions and analysis frameworks for risk, vulnerability, and resilience. Risk Analysis, 2011; 31(4):515–522.
-
(2011)
Risk Analysis
, vol.31
, Issue.4
, pp. 515-522
-
-
Aven, T.1
-
28
-
-
67649548424
-
Choice and chance: A conceptual model of paths to information security compromise
-
Ransbotham S, Mitra S. Choice and chance: A conceptual model of paths to information security compromise. Information Systems Research, 2009; 20:121–139.
-
(2009)
Information Systems Research
, vol.20
, pp. 121-139
-
-
Ransbotham, S.1
Mitra, S.2
-
30
-
-
84926442736
-
Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models
-
Rao NS, Poole SW, Ma CY, He F, Zhuang J, Yau DK. Defense of cyber infrastructures against cyber-physical attacks using game-theoretic models. Risk Analysis, 2016; 36(4):694–710.
-
(2016)
Risk Analysis
, vol.36
, Issue.4
, pp. 694-710
-
-
Rao, N.S.1
Poole, S.W.2
Ma, C.Y.3
He, F.4
Zhuang, J.5
Yau, D.K.6
-
31
-
-
80053384354
-
A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management
-
Merrick J, Parnell GS. A comparative analysis of PRA and intelligent adversary methods for counterterrorism risk management. Risk Analysis, 2011; 31(9):1488–1510.
-
(2011)
Risk Analysis
, vol.31
, Issue.9
, pp. 1488-1510
-
-
Merrick, J.1
Parnell, G.S.2
-
32
-
-
79951522406
-
How probabilistic risk assessment can mislead terrorism risk analysts
-
Brown GG, Cox Jr LAT. How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis, 2011; 31(2):196–204.
-
(2011)
Risk Analysis
, vol.31
, Issue.2
, pp. 196-204
-
-
Brown, G.G.1
Cox, L.A.T.2
-
33
-
-
84869141956
-
-
Verizon,, Accessed November 2016
-
Verizon. 2016 Data Breach Investigation Report. Verizon, 2016. Available at: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/, Accessed November 2016.
-
(2016)
2016 Data Breach Investigation Report
-
-
-
35
-
-
84869494073
-
On “black swans” and “perfect storms”: Risk analysis and management when statistics are not enough
-
Paté-Cornell E. On “black swans” and “perfect storms”: Risk analysis and management when statistics are not enough. Risk Analysis, 2012; 32(11):1823–1833.
-
(2012)
Risk Analysis
, vol.32
, Issue.11
, pp. 1823-1833
-
-
Paté-Cornell, E.1
-
36
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
Tankard C. Advanced persistent threats and how to monitor and deter them. Network Security, 2011; 2011(8):16–19.
-
(2011)
Network Security
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
37
-
-
84869388520
-
-
in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12). AC
-
Grier C, Ballard L, Caballero J, Chachra N, Dietrich CJ, Levchenko K, et al. Manufacturing compromise: The emergence of exploit-as-a-service. Pp. 821–832 in Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS'12). ACM, 2012.
-
(2012)
Manufacturing compromise: The emergence of exploit-as-a-service
, pp. 821-832
-
-
Grier, C.1
Ballard, L.2
Caballero, J.3
Chachra, N.4
Dietrich, C.J.5
Levchenko, K.6
-
39
-
-
84861093550
-
SCADA security in the light of cyber-warfare
-
Nicholson A, Webber S, Dyer S, Patel T, Janicke H. SCADA security in the light of cyber-warfare. Computers & Security, 2012; 31(4):418–436.
-
(2012)
Computers & Security
, vol.31
, Issue.4
, pp. 418-436
-
-
Nicholson, A.1
Webber, S.2
Dyer, S.3
Patel, T.4
Janicke, H.5
-
40
-
-
84869141956
-
-
Verizon, 2015., Accessed Novembe
-
Verizon. 2015 Data Breach Investigations Report. Verizon, 2015. Available at: http://www.verizon.com/about/news/2015-data-breach-report-info/, Accessed November 2016.
-
(2016)
2015 Data Breach Investigations Report
-
-
-
42
-
-
85027416961
-
-
TrendMicro,, Accessed November 2016
-
TrendMicro. Exploit Kit. TrendMicro, 2016. Available at: http://www.trendmicro.com/vinfo/us/security/definition/exploit-kit, Accessed November 2016.
-
(2016)
Exploit Kit
-
-
-
43
-
-
84893098033
-
-
Preliminary analysis of exploit kits as software artefacts., in Proc. of ESSoS 201
-
Kotov V, Massacci F. Anatomy of exploit kits. Preliminary analysis of exploit kits as software artefacts. Pp. 181–196 in Proc. of ESSoS 2013, 2013.
-
(2013)
Anatomy of exploit kits
, pp. 181-196
-
-
Kotov, V.1
Massacci, F.2
-
44
-
-
85027401032
-
-
Sophos, editor., Sophos,, Accessed November 2016
-
Sophos. Sophos, editor. Location-based threats: How cybercriminals target you based on where you live. Sophos, 2016. Available at: https://doi.org/blogs.sophos.com/2016/05/03/location-based-ransomware-threat-research/, Accessed November 2016.
-
(2016)
Location-based threats: How cybercriminals target you based on where you live
-
-
-
46
-
-
84924049184
-
-
in Proceedings of the 2015 Engineering Secure Software and Systems Conference (ESSoS'15
-
Allodi L. The Heavy Tails of Vulnerability Exploitation. Pp. 133–148 in Proceedings of the 2015 Engineering Secure Software and Systems Conference (ESSoS'15), 2015.
-
(2015)
The Heavy Tails of Vulnerability Exploitation
, pp. 133-148
-
-
Allodi, L.1
-
47
-
-
84906771411
-
Dumitraş T. Some vulnerabilities are different than others
-
in, Springe
-
Nayak K, Marino D, Efstathopoulos P, Dumitraş T. Some vulnerabilities are different than others. Pp. 426–446 in Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses. Springer, 2014.
-
(2014)
Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses
, pp. 426-446
-
-
Nayak, K.1
Marino, D.2
Efstathopoulos, P.3
-
48
-
-
84908223993
-
The operational role of security information and event management systems
-
Bhatt S, Manadhata PK, Zomlot L. The operational role of security information and event management systems. IEEE Security Privacy, 2014; 12(5):35–41.
-
(2014)
IEEE Security Privacy
, vol.12
, Issue.5
, pp. 35-41
-
-
Bhatt, S.1
Manadhata, P.K.2
Zomlot, L.3
-
50
-
-
0003669844
-
-
310002009, ISO/IE
-
ISO/IEC. 31000:2009: Risk Management. ISO/IEC, 2009.
-
(2009)
Risk Management
-
-
-
54
-
-
84885068202
-
-
Committee of Sponsoring Organizations of the Treadway Commissio
-
Curtis P, Carey M. Risk assessment in practice. Committee of Sponsoring Organizations of the Treadway Commission, 2012. Available at: http://www.coso.org.
-
(2012)
Risk assessment in practice
-
-
Curtis, P.1
Carey, M.2
-
55
-
-
84959105324
-
National and Global risk studies: How can the field of risk analysis contribute
-
Accessed April 2017
-
Aven T, Cox LA. National and Global risk studies: How can the field of risk analysis contribute? Risk Analysis, 2016; 36(2):186–190. Available at: https://doi.org/10.1111/risa.12584, Accessed April 2017.
-
(2016)
Risk Analysis
, vol.36
, Issue.2
, pp. 186-190
-
-
Aven, T.1
Cox, L.A.2
-
56
-
-
85027397624
-
-
Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0. NIS
-
Quinn SD, Scarfone KA, Barrett M, Johnson CS. SP 800-117. Guide to Adopting and Using the Security Content Automation Protocol (SCAP) Version 1.0. NIST, 2010.
-
(2010)
SP 800-117
-
-
Quinn, S.D.1
Scarfone, K.A.2
Barrett, M.3
Johnson, C.S.4
-
57
-
-
84928659254
-
-
in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE'14
-
Naaliel M, Joao D, Henrique M. Security benchmarks for web serving systems. Pp. 1–12 in Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering (ISSRE'14), 2014.
-
(2014)
Security benchmarks for web serving systems
, pp. 1-12
-
-
Naaliel, M.1
Joao, D.2
Henrique, M.3
-
58
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha A, Park JM. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 2007; 51(12):3448–3470.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
59
-
-
84905054609
-
Foundational issues in risk assessment and risk management
-
Aven T, Zio E. Foundational issues in risk assessment and risk management. Risk Analysis, 2014; 34(7):1164–1172.
-
(2014)
Risk Analysis
, vol.34
, Issue.7
, pp. 1164-1172
-
-
Aven, T.1
Zio, E.2
-
61
-
-
33750093555
-
-
109–137 in, Lee Dt, Shieh SP, Tygar JD, (eds). Computer Security in the 21st Century., Boston, MA, Springer U
-
Howard M, Pincus J, Wing JM. Measuring relative attack surfaces. Pp. 109–137 in Lee Dt, Shieh SP, Tygar JD (eds). Computer Security in the 21st Century. Boston, MA: Springer US, 2005.
-
(2005)
Measuring relative attack surfaces
-
-
Howard, M.1
Pincus, J.2
Wing, J.M.3
-
63
-
-
67349177466
-
Hierarchical, model-based risk management of critical infrastructures
-
Baiardi F, Telmon C, Sgandurra D. Hierarchical, model-based risk management of critical infrastructures. Reliability Engineering & System Safety, 2009; 94(9):1403–1415.
-
(2009)
Reliability Engineering & System Safety
, vol.94
, Issue.9
, pp. 1403-1415
-
-
Baiardi, F.1
Telmon, C.2
Sgandurra, D.3
-
65
-
-
77953695984
-
Cybersecurity for critical infrastructures: Attack and defense modeling
-
Ten CW, Manimaran G, Liu CC. Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 2010; 40(4):853–865.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans
, vol.40
, Issue.4
, pp. 853-865
-
-
Ten, C.W.1
Manimaran, G.2
Liu, C.C.3
-
66
-
-
84924809380
-
Pareto-optimal adversarial defense of enterprise systems
-
Accessed April 2017
-
Serra E, Jajodia S, Pugliese A, Rullo A, Subrahmanian VS. Pareto-optimal adversarial defense of enterprise systems. ACM Transactions on Information and System Security, 2015; 17(3):11:1–11:39. Available at: https://doi.acm.org/10.1145/2699907, Accessed April 2017.
-
(2015)
ACM Transactions on Information and System Security
, vol.17
, Issue.3
, pp. 11:1-11:39
-
-
Serra, E.1
Jajodia, S.2
Pugliese, A.3
Rullo, A.4
Subrahmanian, V.S.5
-
68
-
-
64749095206
-
Optimal security hardening using multi-objective optimization on attack tree models of networks
-
in, CCS '07., ACM, Available from, Accessed April 2017
-
Dewri R, Poolsappasit N, Ray I, Whitley D. Optimal security hardening using multi-objective optimization on attack tree models of networks. Pp. 204–213 in Proceedings of the 14th ACM Conference on Computer and Communications Security. CCS '07. ACM, 2007. Available from: https://doi.acm.org/10.1145/1315245.1315272, Accessed April 2017.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 204-213
-
-
Dewri, R.1
Poolsappasit, N.2
Ray, I.3
Whitley, D.4
-
69
-
-
84894561473
-
A large-scale study of the time required to compromise a computer system
-
Holm H. A large-scale study of the time required to compromise a computer system. IEEE Transactions on Dependable and Secure Computing, 2014; 11(1):2–15.
-
(2014)
IEEE Transactions on Dependable and Secure Computing
, vol.11
, Issue.1
, pp. 2-15
-
-
Holm, H.1
-
70
-
-
58849103145
-
A comprehensive network security risk model for process control networks
-
Henry MH, Haimes YY. A comprehensive network security risk model for process control networks. Risk Analysis, 2009; 29(2):223–248.
-
(2009)
Risk Analysis
, vol.29
, Issue.2
, pp. 223-248
-
-
Henry, M.H.1
Haimes, Y.Y.2
-
71
-
-
33749639831
-
Quantitative cyber risk reduction estimation methodology for a small SCADA control system
-
McQueen MA, Boyer WF, Flynn MA, Beitel GA. Quantitative cyber risk reduction estimation methodology for a small SCADA control system. Proceedings of the 39nd Hawaii International Conference on System Sciences, 2006; 9:226.
-
(2006)
Proceedings of the 39nd Hawaii International Conference on System Sciences
, vol.9
, pp. 226
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
73
-
-
42549101645
-
Vulnerability assessment of cybersecurity for SCADA systems using attack trees
-
in, 2007., IEE
-
Ten CW, Liu CC, Govindarasu M. Vulnerability assessment of cybersecurity for SCADA systems using attack trees. Pp. 1–8 in Power Engineering Society General Meeting, 2007. IEEE, 2007.
-
(2007)
Power Engineering Society General Meeting
, pp. 1-8
-
-
Ten, C.W.1
Liu, C.C.2
Govindarasu, M.3
-
77
-
-
85027401309
-
-
Google Patents,, US Patent A 11/941,193
-
Kang PY, Sim WT, Kim WH. Security risk evaluation method for effective threat management. Google Patents, 2007. US Patent App. 11/941,193.
-
(2007)
Security risk evaluation method for effective threat management
-
-
Kang, P.Y.1
Sim, W.T.2
Kim, W.H.3
-
78
-
-
85027394086
-
-
Google Patents,, US 195,490
-
Tambe M, Paruchuri P, Ordóñez F, Kraus S, Pearce J, Marecki J. Agent security via approximate solvers. Google Patents, 2012. US Patent 8,195,490.
-
(2012)
Agent security via approximate solvers
-
-
Tambe, M.1
Paruchuri, P.2
Ordóñez, F.3
Kraus, S.4
Pearce, J.5
Marecki, J.6
-
79
-
-
85027413021
-
-
Google Patents,, US Patent A 11/232,004
-
Wiemer D, Robert JM, McFarlane B, Gustave C, Chow S, Tang J. Application of cut-sets to network interdependency security risk assessment. Google Patents, 2005. US Patent App. 11/232,004.
-
(2005)
Application of cut-sets to network interdependency security risk assessment
-
-
Wiemer, D.1
Robert, J.M.2
McFarlane, B.3
Gustave, C.4
Chow, S.5
Tang, J.6
-
80
-
-
35148858636
-
-
Google Patents,, US 952,779
-
Cohen G, Meiseles M, Reshef E. System and method for risk detection and analysis in a computer network. Google Patents, 2005. US Patent 6,952,779.
-
(2005)
System and method for risk detection and analysis in a computer network
-
-
Cohen, G.1
Meiseles, M.2
Reshef, E.3
-
81
-
-
85027413848
-
-
NTIA,, Accessed December 2016
-
NTIA. NTIA vulnerability disclosure call for comments. NTIA, 2016. Available at: https://doi.org/www.ntia.doc.gov/files/ntia/publications/fr_meeting_vulnerability_disclosure_msp_04082016.pdf, Accessed December 2016.
-
(2016)
NTIA vulnerability disclosure call for comments
-
-
-
82
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
Accessed April 2017
-
Tversky A, Kahneman D. Judgment under uncertainty: Heuristics and biases. Science. 1974; 185(4157):1124–1131. Available at: http://science.sciencemag.org/content/185/4157/1124, Accessed April 2017.
-
(1974)
Science
, vol.185
, Issue.4157
, pp. 1124-1131
-
-
Tversky, A.1
Kahneman, D.2
-
83
-
-
55349106566
-
Some limitations of “risk= threat× vulnerability× consequence” for risk analysis of terrorist attacks
-
Cox Jr LAT. Some limitations of “risk= threat× vulnerability× consequence” for risk analysis of terrorist attacks. Risk Analysis, 2008; 28(6):1749–1761.
-
(2008)
Risk Analysis
, vol.28
, Issue.6
, pp. 1749-1761
-
-
Cox, L.A.T.1
-
84
-
-
85048369122
-
Examining the costs and causes of cyber incidents
-
Romanosky S. Examining the costs and causes of cyber incidents. Journal of Cybersecurity, 2016; 2(2):121–135.
-
(2016)
Journal of Cybersecurity
, vol.2
, Issue.2
, pp. 121-135
-
-
Romanosky, S.1
-
86
-
-
79952055675
-
The impact of information security events on the stock value of firms: The effect of contingency factors
-
Yayla AA, Hu Q. The impact of information security events on the stock value of firms: The effect of contingency factors. Journal of Information Technology, 2011; 26(1): 60–77.
-
(2011)
Journal of Information Technology
, vol.26
, Issue.1
, pp. 60-77
-
-
Yayla, A.A.1
Hu, Q.2
-
87
-
-
69049088859
-
Empirical analysis of the effects of cyber security incidents
-
Accessed April 2017
-
Davis G, Garcia A, Zhang W. Empirical analysis of the effects of cyber security incidents. Risk Analysis, 2009; 29(9):1304–1316. Available at: https://doi.org/10.1111/j.1539-6924.2009.01245.x, Accessed April 2017.
-
(2009)
Risk Analysis
, vol.29
, Issue.9
, pp. 1304-1316
-
-
Davis, G.1
Garcia, A.2
Zhang, W.3
-
88
-
-
77950821955
-
Probabilistic risk analysis and terrorism risk
-
Accessed April 2017
-
Ezell BC, Bennett SP, Von Winterfeldt D, Sokolowski J, Collins AJ. Probabilistic risk analysis and terrorism risk. Risk Analysis, 2010; 30(4):575–589. Available at: https://doi.org/10.1111/j.1539-6924.2010.01401.x, Accessed April 2017.
-
(2010)
Risk Analysis
, vol.30
, Issue.4
, pp. 575-589
-
-
Ezell, B.C.1
Bennett, S.P.2
Von Winterfeldt, D.3
Sokolowski, J.4
Collins, A.J.5
-
89
-
-
79951522406
-
How probabilistic risk assessment can mislead terrorism risk analysts
-
Accessed April 2017
-
Brown GG, Cox, LAT Jr. How probabilistic risk assessment can mislead terrorism risk analysts. Risk Analysis, 2011; 31(2):196–204. Available at: https://doi.org/10.1111/j.1539-6924.2010.01492.x, Accessed April 2017.
-
(2011)
Risk Analysis
, vol.31
, Issue.2
, pp. 196-204
-
-
Brown, G.G.1
Cox, L.A.T.2
-
91
-
-
85030331081
-
-
in WEIS, 2017., Accessed April 2017
-
Allodi L, Massacci F, Williams J. The work-averse cyber attacker model. Evidence from two million attack signatures. Pp. 1–35 in WEIS, 2017. Available at: https://doi.org/ssrn.com/abstract=2862299, Accessed April 2017.
-
The work-averse cyber attacker model. Evidence from two million attack signatures
, pp. 1-35
-
-
Allodi, L.1
Massacci, F.2
Williams, J.3
-
95
-
-
27544493249
-
-
in Dependable Systems and Networks,, IEEE, 2005
-
Panjwani S, Tan S, Jarrin KM, Cukier M. An experimental evaluation to determine if port scans are precursors to an attack. Pp. 602–611 in Dependable Systems and Networks, 2005. IEEE, 2005.
-
(2005)
An experimental evaluation to determine if port scans are precursors to an attack
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.M.3
Cukier, M.4
-
96
-
-
0032645074
-
TCP/IP security threats and attack methods
-
Harris B, Hunt R. TCP/IP security threats and attack methods. Computer Communications, 1999; 22(10):885–897.
-
(1999)
Computer Communications
, vol.22
, Issue.10
, pp. 885-897
-
-
Harris, B.1
Hunt, R.2
-
97
-
-
72249089745
-
On the complex definition of risk: A systems-based approach
-
Haimes YY. On the complex definition of risk: A systems-based approach. Risk Analysis, 2009; 29(12):1647–1654.
-
(2009)
Risk Analysis
, vol.29
, Issue.12
, pp. 1647-1654
-
-
Haimes, Y.Y.1
-
98
-
-
84929626712
-
Loving the cyber bomb: The dangers of threat inflation in cybersecurity policy
-
Brito J, Watkins T. Loving the cyber bomb: The dangers of threat inflation in cybersecurity policy. Harvard National Security Journal, 2011; 3:39–84.
-
(2011)
Harvard National Security Journal
, vol.3
, pp. 39-84
-
-
Brito, J.1
Watkins, T.2
-
99
-
-
77957057726
-
Circuits of power: A study of mandated compliance to an information systems security “de jure” standard in a government organization
-
Smith S, Winchester D, Bunker D, Jamieson R. Circuits of power: A study of mandated compliance to an information systems security “de jure” standard in a government organization. MIS Quarterly, 2010; 34(3):463–486.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 463-486
-
-
Smith, S.1
Winchester, D.2
Bunker, D.3
Jamieson, R.4
-
101
-
-
78149400487
-
-
in Proceedings of the Fourth European Conference on Software Architecture. ECSA '10. ACM,, Accessed April 2017
-
Mellado D, Fernández-Medina E, Piattini M. A comparison of software design security metrics. Pp. 236–242 in Proceedings of the Fourth European Conference on Software Architecture. ECSA '10. ACM, 2010. Available at: https://doi.acm.org/10.1145/1842752.1842797, Accessed April 2017.
-
(2010)
A comparison of software design security metrics
, pp. 236-242
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
102
-
-
84872103923
-
-
in Proceedings of the 28th Annual Computer Security Applications Conferenc
-
Anderson R. Security economics—A personal perspective. Pp. 139–144 in Proceedings of the 28th Annual Computer Security Applications Conference, 2012.
-
(2012)
Security economics—A personal perspective
, pp. 139-144
-
-
Anderson, R.1
-
103
-
-
84945195923
-
-
in Proceedings of the 36th IEEE Symposium on Security and Privac
-
Nappa A, Johnson R, Bilge L, Caballero J, Dumitras T. The attack of the clones: A study of the impact of shared code on vulnerability patching. Pp. 692–708 in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015.
-
(2015)
The attack of the clones: A study of the impact of shared code on vulnerability patching
, pp. 692-708
-
-
Nappa, A.1
Johnson, R.2
Bilge, L.3
Caballero, J.4
Dumitras, T.5
-
104
-
-
10444243686
-
-
in Proceedings of the 10th ACM Conference on Computer and Communications Security. AC
-
Ning P, Xu D. Learning attack strategies from intrusion alerts. Pp. 200–209 in Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM, 2003.
-
(2003)
Learning attack strategies from intrusion alerts
, pp. 200-209
-
-
Ning, P.1
Xu, D.2
-
105
-
-
77949879017
-
-
in Software Engineering, 2009. ICSE 2009. IEE
-
Kieyzun A, Guo PJ, Jayaraman K, Ernst MD. Automatic creation of SQL injection and cross-site scripting attacks. Pp. 199–209 in Software Engineering, 2009. ICSE 2009. IEEE, 2009.
-
(2009)
Automatic creation of SQL injection and cross-site scripting attacks
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
106
-
-
84867720303
-
Man in the middle attacks demos
-
Ornaghi A, Valleri M. Man in the middle attacks demos. Blackhat, 2003; 19.
-
(2003)
Blackhat
, vol.19
-
-
Ornaghi, A.1
Valleri, M.2
|