关注
Chad Heitzenrater
Chad Heitzenrater
在 rand.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
452015
Policy, statistics and questions: Reflections on UK cyber security disclosures
CD Heitzenrater, AC Simpson
Journal of Cybersecurity 2 (1), 43-56, 2016
282016
The days before zero day: Investment models for secure software engineering
C Heitzenrater, R Böhme, A Simpson
Proceedings of the 15th Workshop on the Economics of Information Security …, 2016
222016
When the winning move is not to play: Games of deterrence in cyber security
C Heitzenrater, G Taylor, A Simpson
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
18*2015
A case for the economics of secure software development
C Heitzenrater, A Simpson
Proceedings of the 2016 New Security Paradigms Workshop, 92-105, 2016
152016
Software security investment: the right amount of a good thing
C Heitzenrater, A Simpson
2016 IEEE Cybersecurity Development (SecDev), 53-59, 2016
72016
Misuse, abuse and reuse: Economic utility functions for characterising security requirements
C Heitzenrater, A Simpson
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Motivating security engineering with economics: A utility function approach
C Heitzenrater, J King-Lacroix, A Simpson
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
42016
Software security investment modelling for decision-support
C Heitzenrater
University of Oxford, 2017
32017
Application of conditional entropy measures to steganalysis
J Marsh, T Knapik, E Lo, C Heitzenrater
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
22006
Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems
MJD Vermeer, PA Stapleton, D Lumpkin, C Heitzenrater, A Moon, ...
RAND Corporation, 2023
12023
A Methodology for Quantifying the Value of Cybersecurity Investments in the Navy
B Wilson, MV Arena, LA Mayer, CD Heitzenrater, J Mastbaum, ...
RAND Corporation, 2022
12022
Improving Space-Related Science and Technology Processes for the US Space Force
BL Triezenberg, J Logue, BJ Sacks, E Parker, B Dolan, M Sargent, ...
< bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024
2024
Enhancing Cybersecurity and Cyber Resiliency of Weapon Systems: Expanded Roles Across a System's Life Cycle
D Snyder, C Heitzenrater
< bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024
2024
Exploring Options to Improve Supply Chain Operations: A Review of Current Approaches and New Opportunities in Demand Forecasting, Robotic Process Automation, and Cyber Integrity
C Heitzenrater, J Steier, L Muggy, DA Goldfeld, CE Maerzluft, B DeBlois, ...
< bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024
2024
Improving Space-Related Science and Technology Processes for the US Space Force
M SARGENT, BL TRIEZENBERG, B DOLAN, A COLLOPY, J LOGUE, ...
2024
Enhancing Cybersecurity and Cyber Resiliency of Weapon Systems
DON SNYDER, C HEITZENRATER
2024
Exploring Options to Improve Supply Chain Operations
JA LEFTWICH, DA Goldfeld, B DeBlois, C HEITZENRATER, L Muggy, ...
2024
Government Acquisition of Cyber Technologies: Lessons Derived from Analysis of the Cybersecurity and Infrastructure Security Agency's Cyber Acquisition Processes
CD Heitzenrater, J Dimarogonas, K Bunch, FA Camm, R Consaul, ...
RAND, 2024
2024
Creating Selective Overmatch: An Approach to Developing Cyberspace Options to Sustain US Primacy Against Revisionist Powers
T Wingfield, Q Hodgson, L Chao, B Downing, J Engstrom, D Grossman, ...
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20