Subject
Information Systems and Management,Management Science and Operations Research,Modelling and Simulation,General Computer Science,Industrial and Manufacturing Engineering
Reference28 articles.
1. The dark side of vulnerability exploitation;Allodi,2012
2. Optimal policy for software vulnerability disclosure;Arora;Management Science,2008
3. Behavior under uncertainty and its implications for policy;Arrow,1983
4. Network software security and user incentives;August;Management Science,2006
5. Contagion in cybersecurity attacks;Baldwin;Journal of the Operational Research Society,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献