Author:
Barth Adam,Rubinstein Benjamin I. P.,Sundararajan Mukund,Mitchell John C.,Song Dawn,Bartlett Peter L.
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Anderson, R.: Why information security is hard—An economic perspective. In: 17th Annual Computer Security Applications Conference, pp. 358–365 (2001)
2. August, T., Tunca, T.I.: Network software security and user incentives. Management Science 52(11), 1703–1720 (2006)
3. Barth, A., Rubinstein, B.I.P., Sundararajan, M., Mitchell, J.C., Song, D., Bartlett, P.L.: A learning-based approach to reactive security (2009),
http://arxiv.org/abs/0912.1155
4. Beard, C.: Introducing Test Pilot (March 2008),
http://labs.mozilla.com/2008/03/introducing-test-pilot/
5. Cavusoglu, H., Raghunathan, S., Yue, W.: Decision-theoretic and game-theoretic approaches to IT security investment. Journal of Management Information Systems 25(2), 281–304 (2008)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献