Author:
Böhme Rainer,Félegyházi Márk
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Su, X.: An overview of economic approaches to information security management. Technical Report TR-CTIT-06-30, University of Twente (2006)
2. Böhme, R., Moore, T.W.: The iterated weakest link: A model of adaptive security investment. In: Workshop on the Economics of Information Security (WEIS), University College, London, UK (2009)
3. Böhme, R., Moore, T.W.: The iterated weakest link. IEEE Security & Privacy 8(1), 53–55 (2010)
4. Panjwani, S., Tan, S., Jarrin, K.M., Cukier, M.: An experimental evaluation to determine if port scans are precursors to an attack. In: Proc. of Int’l. Conf. on Dependable Systems and Networks (DSN 2005), Yokkohama, Japan (2005)
5. Gordon, L.A., Loeb, M.P., Lucysshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6) (2003)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. ISO/IEC 27001-Based Estimation of Cybersecurity Costs with Caspea;International Conference on Information Systems Development;2024-09-09
2. Bug-Bounty, ¿el futuro del Pentesting?;Ciencia e Ingeniería Neogranadina;2024-06-30
3. Distributed web hacking by adaptive consensus-based reinforcement learning;Artificial Intelligence;2024-01
4. Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices;International Series in Operations Research & Management Science;2023
5. Introduction and Overview;International Series in Operations Research & Management Science;2023