Improving Security Policy Decisions with Models
暂无分享,去创建一个
[1] Lawrence A. Gordon,et al. Managing Cybersecurity Resources: A Cost-Benefit Analysis , 2005 .
[2] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[3] Hal R. Varian. Intermediate Microeconomics with Calculus , 2014 .
[4] Robin Milner,et al. Calculi for Synchrony and Asynchrony , 1983, Theor. Comput. Sci..
[5] H. Raiffa,et al. Decisions with Multiple Objectives , 1993 .
[6] S. Jørgensen. The art of computer systems performance analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling. Raj Jain. John Wiley, New York. Hardcover, 720 p. U.S. $52.95. , 1992 .
[7] George Coulouris,et al. Distributed systems - concepts and design , 1988 .
[8] Otto Eckmüllner,et al. The production functions , 1984 .
[9] George Coulouris,et al. Distributed systems (3rd ed.): concepts and design , 2000 .
[10] David J. Pym,et al. Modelling and simulating systems security policy , 2015, SimuTools.
[11] M. Angela Sasse,et al. Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security , 2008, WEIS.
[12] A. Zellner. Bayesian Estimation and Prediction Using Asymmetric Loss Functions , 1986 .
[13] M. Angela Sasse,et al. The compliance budget: managing security behaviour in organisations , 2009, NSPW '08.
[14] Simon Shiu,et al. Decision support for systems security investment , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[15] Julian Williams,et al. Information security trade-offs and optimal patching policies , 2012, Eur. J. Oper. Res..
[16] David J. Pym,et al. A Discipline of Mathematical Systems Modelling , 2012 .