4.6 Article

The Work-Averse Cyberattacker Model: Theory and Evidence from Two Million Attack Signatures

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Public, Environmental & Occupational Health

Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports

Gabriel Kuper et al.

RISK ANALYSIS (2020)

Article Computer Science, Software Engineering

A Screening Test for Disclosed Vulnerabilities in FOSS Components

Stanislav Dashevskyi et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2019)

Article Engineering, Industrial

Modeling a multi-target attacker-defender game with multiple attack types

Jing Zhang et al.

RELIABILITY ENGINEERING & SYSTEM SAFETY (2019)

Proceedings Paper Computer Science, Information Systems

Up-To-Crash: Evaluating Third-Party Library Updatability on Android

Jie Huang et al.

2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P) (2019)

Proceedings Paper Engineering, Industrial

ARMED: How Automatic Malware Modifications Can Evade Static Detection?

Raphael Labaca Castro et al.

5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019) (2019)

Article International Relations

A matter of time: On the transitory nature of cyberweapons

Max Smeets

JOURNAL OF STRATEGIC STUDIES (2018)

Article Public, Environmental & Occupational Health

Resilience of Cyber Systems with Over- and Underregulation

Viktoria Gisladottir et al.

RISK ANALYSIS (2017)

Article Public, Environmental & Occupational Health

Security Events and Vulnerability Data for Cybersecurity Risk Estimation

Luca Allodi et al.

RISK ANALYSIS (2017)

Article Computer Science, Information Systems

Correlated Failures, Diversification, and Information Security Risk Management

Chen et al.

MIS QUARTERLY (2017)

Proceedings Paper Computer Science, Information Systems

Economic Factors of Vulnerability Trade and Exploitation

Luca Allodi

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Theory & Methods

Game Theory for Cyber Security and Privacy

Cuong T. Do et al.

ACM COMPUTING SURVEYS (2017)

Article Public, Environmental & Occupational Health

Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

Nageswara S. V. Rao et al.

RISK ANALYSIS (2016)

Review Computer Science, Information Systems

A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva et al.

COMPUTERS & SECURITY (2016)

Article Management

Economic and Policy Implications of Restricted Patch Distribution

Karthik Kannan et al.

MANAGEMENT SCIENCE (2016)

Article Computer Science, Information Systems

Then and Now On the Maturity of the Cybercrime Markets The Lesson That Black-Hat Marketeers Learned

Luca Allodi et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2016)

Article Criminology & Penology

Exploring the Provision of Online Booter Services

Alice Hutchings et al.

DEVIANT BEHAVIOR (2016)

Article Information Science & Library Science

Mandatory Standards and Organizational Information Security

Chul Ho Lee et al.

INFORMATION SYSTEMS RESEARCH (2016)

Article Computer Science, Information Systems

Pareto-Optimal Adversarial Defense of Enterprise Systems

Edoardo Serra et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2015)

Editorial Material Public, Environmental & Occupational Health

Infrastructure Systems, Risk Analysis, and ResilienceResearch Gaps and Opportunities

Seth Guikema et al.

RISK ANALYSIS (2015)

Proceedings Paper Computer Science, Theory & Methods

The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching

Antonio Nappa et al.

2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015 (2015)

Article Computer Science, Interdisciplinary Applications

Optimal Policies for Security Patch Management

Debabrata Dey et al.

INFORMS JOURNAL ON COMPUTING (2015)

Article Information Science & Library Science

Information Disclosure and the Diffusion of Information Security Attacks

Sabyasachi Mitra et al.

INFORMATION SYSTEMS RESEARCH (2015)

Article Computer Science, Theory & Methods

Game Theory Meets Network Security and Privacy

Mohammad Hossein Manshaei et al.

ACM COMPUTING SURVEYS (2013)

Article Computer Science, Information Systems

When Does Targeting Make Sense for an Attacker?

Cormac Herley

IEEE SECURITY & PRIVACY (2013)

Article Computer Science, Theory & Methods

FLIPIT: The Game of Stealthy Takeover

Marten van Dijk et al.

JOURNAL OF CRYPTOLOGY (2013)

Article Public, Environmental & Occupational Health

On Black Swans and Perfect Storms: Risk Analysis and Management When Statistics Are Not Enough

Elisabeth Pate-Cornell

RISK ANALYSIS (2012)

Article Economics

The Economics of Spam

Justin M. Rao et al.

JOURNAL OF ECONOMIC PERSPECTIVES (2012)

Article Public, Environmental & Occupational Health

How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts

Gerald G. Brown et al.

RISK ANALYSIS (2011)

Article Statistics & Probability

Adversarial Risk Analysis

Insua Rios Insua et al.

JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION (2009)

Article Information Science & Library Science

Choice and Chance: A Conceptual Model of Paths to Information Security Compromise

Sam Ransbotham et al.

INFORMATION SYSTEMS RESEARCH (2009)

Article Public, Environmental & Occupational Health

Some Limitations of Risk = Threat x Vulnerability x Consequence for Risk Analysis of Terrorist Attacks

Louis Anthony (Tony) Cox

RISK ANALYSIS (2008)