The economics of information security
The economics of information security has recently become a thriving and fast-moving
discipline. As distributed systems are assembled from machines belonging to principals with …
discipline. As distributed systems are assembled from machines belonging to principals with …
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …
hacking toward well-organized cyber crime can be observed. These attacks are typically …
Research in operations management and information systems interface
Owing to its multidisciplinary nature, the operations management (OM) and information
systems (IS) interface distinguishes itself from the individually focused perspective of both …
systems (IS) interface distinguishes itself from the individually focused perspective of both …
Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system
R Syed - Information & Management, 2020 - Elsevier
Effective vulnerability management requires the integration of vulnerability information
available on multiple sources, including social media. The information could be used to …
available on multiple sources, including social media. The information could be used to …
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse.
Chief among these demands, administrators must monitor the continual ongoing disclosure …
Chief among these demands, administrators must monitor the continual ongoing disclosure …
Exploit prediction scoring system (epss)
Despite the large investments in information security technologies and research over the
past decades, the information security industry is still immature when it comes to …
past decades, the information security industry is still immature when it comes to …
[HTML][HTML] Ethics in cybersecurity research and practice
This paper critiques existing governance in cyber-security ethics through providing an
overview of some of the ethical issues facing researchers in the cybersecurity community …
overview of some of the ethical issues facing researchers in the cybersecurity community …
An empirical analysis of the impact of software vulnerability announcements on firm stock price
Security defects in software cost millions of dollars to firms in terms of downtime, disruptions,
and confidentiality breaches. However, the economic implications of these defects for …
and confidentiality breaches. However, the economic implications of these defects for …
Machine Learning for Computer and Cyber Security
BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …
Improving vulnerability remediation through better exploit prediction
Despite significant innovations in IT security products and research over the past 20 years,
the information security field is still immature and struggling. Practitioners lack the ability to …
the information security field is still immature and struggling. Practitioners lack the ability to …