Risk-based security decisions under uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng… - Proceedings of the …, 2012 - dl.acm.org
This paper addresses the making of security decisions, such as access-control decisions or
spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need …

Risk-based security decisions under uncertainty

I Molloy, L Dickens, C Morisset… - ACM Conference on …, 2012 - research.ibm.com
This paper addresses the making of security decisions, such as access-control decisions or
spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need …

[PDF][PDF] Risk-Based Security Decisions Under Uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo… - 2012 - academia.edu
This paper addresses the making of security decisions, such as access-control decisions or
spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need …

[PDF][PDF] Risk-Based Security Decisions Under Uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo… - 2012 - researchgate.net
This paper addresses the making of security decisions, such as access-control decisions or
spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need …

[引用][C] Risk-based security decisions under uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng… - Proceedings of the …, 2012 - inria.hal.science
Risk-based security decisions under uncertainty - Inria - Institut national de recherche en
sciences et technologies du numérique Accéder directement au contenu Documentation FR …

[引用][C] Risk-based security decisions under uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng… - Proceedings of the …, 2012 - hal.science
Risk-based security decisions under uncertainty - Archive ouverte HAL Accéder directement
au contenu Documentation FR Français (FR) Anglais (EN) Se connecter HAL science …

[PDF][PDF] Risk-Based Security Decisions Under Uncertainty

I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo… - 2012 - academia.edu
This paper addresses the making of security decisions, such as access-control decisions or
spam filtering decisions, under uncertainty, when the benefit of doing so outweighs the need …