Economics of IT Security Management
暂无分享,去创建一个
[1] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[2] Huseyin Cavusoglu,et al. Model for Evaluating , 2022 .
[3] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[4] Huseyin Cavusoglu,et al. Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches , 2003, ICIS.
[5] Lawrence A. Gordon,et al. The economics of information security investment , 2002, TSEC.
[6] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[7] Salvatore J. Stolfo,et al. Toward Cost-Sensitive Modeling for Intrusion Detection and Response , 2002, J. Comput. Secur..
[8] Stefan Engel-Flechsig,et al. Is The Game Finally Up For Cyber-Criminals? , 2002 .
[9] Huseyin Cavusoglu,et al. ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY , 2002 .
[10] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Yacov Y. Haimes,et al. Are we forgetting the risks of information technology? , 2000, Computer.
[12] Suresh L. Konda,et al. The Survivability of Network Systems: An Empirical Analysis , 2000 .
[13] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[14] Michael M. May,et al. How much is enough? A risk management approach to computer security , 2000 .
[15] Terry Dwain Escamilla,et al. Intrusion detection: network security beyond the firewall , 1998 .
[16] Terry Escamilla,et al. Intrusion detection , 1998 .
[17] Erik Brynjolfsson,et al. The productivity paradox of information technology , 1993, CACM.
[18] E. Fama,et al. The Adjustment of Stock Prices to New Information , 1969 .