Cyber-threats information sharing in cloud computing: A game theoretic approach C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015 | 45 | 2015 |
Policy, statistics and questions: Reflections on UK cyber security disclosures CD Heitzenrater, AC Simpson Journal of Cybersecurity 2 (1), 43-56, 2016 | 28 | 2016 |
The days before zero day: Investment models for secure software engineering C Heitzenrater, R Böhme, A Simpson Proceedings of the 15th Workshop on the Economics of Information Security …, 2016 | 22 | 2016 |
When the winning move is not to play: Games of deterrence in cyber security C Heitzenrater, G Taylor, A Simpson Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015 | 18* | 2015 |
A case for the economics of secure software development C Heitzenrater, A Simpson Proceedings of the 2016 New Security Paradigms Workshop, 92-105, 2016 | 15 | 2016 |
Software security investment: the right amount of a good thing C Heitzenrater, A Simpson 2016 IEEE Cybersecurity Development (SecDev), 53-59, 2016 | 7 | 2016 |
Misuse, abuse and reuse: Economic utility functions for characterising security requirements C Heitzenrater, A Simpson 2016 11th International Conference on Availability, Reliability and Security …, 2016 | 7 | 2016 |
Motivating security engineering with economics: A utility function approach C Heitzenrater, J King-Lacroix, A Simpson 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 4 | 2016 |
Software security investment modelling for decision-support C Heitzenrater University of Oxford, 2017 | 3 | 2017 |
Application of conditional entropy measures to steganalysis J Marsh, T Knapik, E Lo, C Heitzenrater Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006 | 2 | 2006 |
Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems MJD Vermeer, PA Stapleton, D Lumpkin, C Heitzenrater, A Moon, ... RAND Corporation, 2023 | 1 | 2023 |
A Methodology for Quantifying the Value of Cybersecurity Investments in the Navy B Wilson, MV Arena, LA Mayer, CD Heitzenrater, J Mastbaum, ... RAND Corporation, 2022 | 1 | 2022 |
Improving Space-Related Science and Technology Processes for the US Space Force BL Triezenberg, J Logue, BJ Sacks, E Parker, B Dolan, M Sargent, ... < bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024 | | 2024 |
Enhancing Cybersecurity and Cyber Resiliency of Weapon Systems: Expanded Roles Across a System's Life Cycle D Snyder, C Heitzenrater < bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024 | | 2024 |
Exploring Options to Improve Supply Chain Operations: A Review of Current Approaches and New Opportunities in Demand Forecasting, Robotic Process Automation, and Cyber Integrity C Heitzenrater, J Steier, L Muggy, DA Goldfeld, CE Maerzluft, B DeBlois, ... < bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024 | | 2024 |
Improving Space-Related Science and Technology Processes for the US Space Force M SARGENT, BL TRIEZENBERG, B DOLAN, A COLLOPY, J LOGUE, ... | | 2024 |
Enhancing Cybersecurity and Cyber Resiliency of Weapon Systems DON SNYDER, C HEITZENRATER | | 2024 |
Exploring Options to Improve Supply Chain Operations JA LEFTWICH, DA Goldfeld, B DeBlois, C HEITZENRATER, L Muggy, ... | | 2024 |
Government Acquisition of Cyber Technologies: Lessons Derived from Analysis of the Cybersecurity and Infrastructure Security Agency's Cyber Acquisition Processes CD Heitzenrater, J Dimarogonas, K Bunch, FA Camm, R Consaul, ... RAND, 2024 | | 2024 |
Creating Selective Overmatch: An Approach to Developing Cyberspace Options to Sustain US Primacy Against Revisionist Powers T Wingfield, Q Hodgson, L Chao, B Downing, J Engstrom, D Grossman, ... | | 2023 |