Sciweavers

29 search results - page 2 / 6
» Optimal Information Security Investment with Penetration Tes...
Sort
View
ISF
2006
118views more  ISF 2006»
13 years 6 months ago
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Abstract Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabiliti...
Ashish Arora, Anand Nandkumar, Rahul Telang
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
13 years 6 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
CHI
2010
ACM
13 years 11 months ago
O job can you return my mojo: improving human engagement and enjoyment in routine activities
Unlike machines, we humans are prone to boredom when we perform routine activities for long periods of time. Workers’ mental engagement in boring tasks diminishes, which eventua...
Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, P...
GECCO
2009
Springer
121views Optimization» more  GECCO 2009»
13 years 11 months ago
Using memetic algorithms to improve portfolio performance in static and dynamic trading scenarios
The Portfolio Optimization problem consists of the selection of a group of assets to a long-term fund in order to minimize the risk and maximize the return of the investment. This...
Claus de Castro Aranha, Hitoshi Iba
ESWA
2008
155views more  ESWA 2008»
13 years 6 months ago
Using GHSOM to construct legal maps for Taiwan's securities and futures markets
A good legal knowledge representation system, capable of effectively providing investors with comprehensive legal knowledge, is needed for investors to prevent erratic behavior be...
Jen-Ying Shih, Yu-Jung Chang, Wun-Hwa Chen