Sciweavers

69 search results - page 2 / 14
» A Fuzzy Model for IT Security Investments
Sort
View
CACM
2004
109views more  CACM 2004»
13 years 4 months ago
A model for evaluating IT security investments
Huseyin Cavusoglu, Birendra Mishra, Srinivasan Rag...
IEEEARES
2006
IEEE
13 years 11 months ago
Defense trees for economic evaluation of security investments
In this paper we present a mixed qualitative and quantitative approach for evaluation of Information Technology (IT) security investments. For this purpose, we model security scen...
Stefano Bistarelli, Fabio Fioravanti, Pamela Peret...
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 5 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
ICDCS
2010
IEEE
13 years 8 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
FSKD
2006
Springer
125views Fuzzy Logic» more  FSKD 2006»
13 years 8 months ago
Towards Security Evaluation Based on Evidence Collection
Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
Reijo Savola