Individual Countermeasure Selection Based on the Return On Response Investment Index
暂无分享,去创建一个
Hervé Debar | Gustavo Gonzalez Granadillo | Chrystel Gaber | Grégoire Jacob | Mohammed Achemlal | G. G. Granadillo | Hervé Debar | Chrystel Gaber | Mohammed Achemlal | G. Jacob
[1] Do-Hoon Kim,et al. Effective Security Safeguard Selection Process for Return on Security Investment , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[2] Nora Cuppens-Boulahia,et al. A Service Dependency Model for Cost-Sensitive Intrusion Response , 2010, ESORICS.
[3] Ryan Ribeiro de Azevedo,et al. An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments , 2010 .
[4] Stefano Bistarelli,et al. Using CP-nets as a guide for countermeasure selection , 2007, SAC '07.
[5] Wes Sonnenreich,et al. Return On Security Investment (ROSI) - A Practical Quantitative Modell , 2005, J. Res. Pract. Inf. Technol..
[6] Thomas Norman. Risk Analysis and Security Countermeasure Selection , 2009 .
[7] Johnny S. Wong,et al. A Cost-Sensitive Model for Preemptive Intrusion Response Systems , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).
[8] Nora Cuppens-Boulahia,et al. Enabling automated threat response through the use of a dynamic security policy , 2007, Journal in Computer Virology.
[9] Edgar R. Weippl,et al. Workshop-based multiobjective security safeguard selection , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[10] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .
[11] William H. Sanders,et al. RRE: A Game-Theoretic Intrusion Response and Recovery Engine , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Jan vom Brocke,et al. Return on Security Investments - Design Principles of Measurement Systems Based on Capital Budgeting , 2007, AMCIS.
[13] Mark Jeffery,et al. Return on Investment Analysis for E‐business Projects , 2004 .
[14] Vasaka Visoottiviseth,et al. Lightweight Detection of DoS Attacks , 2007, 2007 15th IEEE International Conference on Networks.
[15] Marco Cremonini,et al. Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA) , 2005, WEIS.