The economics of information security

R Anderson, T Moore - science, 2006 - science.org
The economics of information security has recently become a thriving and fast-moving
discipline. As distributed systems are assembled from machines belonging to principals with …

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …

Research in operations management and information systems interface

S Kumar, V Mookerjee… - Production and …, 2018 - journals.sagepub.com
Owing to its multidisciplinary nature, the operations management (OM) and information
systems (IS) interface distinguishes itself from the individually focused perspective of both …

Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system

R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …

Beyond heuristics: learning to classify vulnerabilities and predict exploits

M Bozorgi, LK Saul, S Savage… - Proceedings of the 16th …, 2010 - dl.acm.org
The security demands on modern system administration are enormous and getting worse.
Chief among these demands, administrators must monitor the continual ongoing disclosure …

Exploit prediction scoring system (epss)

J Jacobs, S Romanosky, B Edwards, I Adjerid… - … Threats: Research and …, 2021 - dl.acm.org
Despite the large investments in information security technologies and research over the
past decades, the information security industry is still immature when it comes to …

[HTML][HTML] Ethics in cybersecurity research and practice

K Macnish, J Van der Ham - Technology in society, 2020 - Elsevier
This paper critiques existing governance in cyber-security ethics through providing an
overview of some of the ethical issues facing researchers in the cybersecurity community …

An empirical analysis of the impact of software vulnerability announcements on firm stock price

R Telang, S Wattal - IEEE Transactions on Software …, 2007 - ieeexplore.ieee.org
Security defects in software cost millions of dollars to firms in terms of downtime, disruptions,
and confidentiality breaches. However, the economic implications of these defects for …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Improving vulnerability remediation through better exploit prediction

J Jacobs, S Romanosky, I Adjerid… - Journal of …, 2020 - academic.oup.com
Despite significant innovations in IT security products and research over the past 20 years,
the information security field is still immature and struggling. Practitioners lack the ability to …