Optimizing Information Systems Security Design Based on Existing Security Knowledge
暂无分享,去创建一个
[1] Tadeusz Sawik,et al. Selection of optimal countermeasure portfolio in IT security planning , 2013, Decis. Support Syst..
[2] Makoto Goto,et al. Optimal Timing of Information Security Investment: A Real Options Approach , 2009, WEIS.
[3] Samir Chatterjee,et al. Cyber-risk decision models: To insure IT or not? , 2013, Decis. Support Syst..
[4] Christian Ullrich,et al. Valuation of IT Investments Using Real Options Theory , 2013, Bus. Inf. Syst. Eng..
[5] Lawrence A. Gordon,et al. Information Security Expenditures and Real Options: A Wait-and-See Approach , 2003 .
[6] Theodosios Tsiakis. Information Security Expenditures: a Techno-Economic Analysis , 2010 .
[7] Loren Paul Rees,et al. IT security planning under uncertainty for high-impact events , 2012 .
[8] Brigitte Werners,et al. A Quantitative Threat Modeling Approach to Maximize the Return on Security Investment in Cloud Computing , 2013 .
[9] Carsten Maple,et al. A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem , 2012, Decis. Support Syst..
[10] Rok Bojanc,et al. Quantitative Model for Economic Analyses of Information Security Investment in an Enterprise Information System , 2012 .
[11] Walter S. Baer,et al. Cyberinsurance in IT Security Management , 2007, IEEE Security & Privacy.
[12] Wes Sonnenreich,et al. Return On Security Investment (ROSI) - A Practical Quantitative Modell , 2005, J. Res. Pract. Inf. Technol..