The economics of information security investment

LA Gordon, MP Loeb - ACM Transactions on Information and System …, 2002 - dl.acm.org
This article presents an economic model that determines the optimal amount to invest to
protect a given set of information. The model takes into account the vulnerability of the …

The economic cost of publicly announced information security breaches: empirical evidence from the stock market

K Campbell, LA Gordon, MP Loeb… - Journal of Computer …, 2003 - content.iospress.com
This study examines the economic effect of information security breaches reported in
newspapers on publicly traded US corporations. We find limited evidence of an overall …

The impact of denial‐of‐service attack announcements on the market value of firms

A Hovav, J D'Arcy - Risk Management and Insurance Review, 2003 - Wiley Online Library
The increase in security breaches in the last few years and the need to insure information
assets has created an intensified interest in information risk within organizations and for …

Security in grid computing: A review and synthesis

E Cody, R Sharman, RH Rao, S Upadhyaya - Decision Support Systems, 2008 - Elsevier
This paper provides an extensive survey of the different methods of addressing security
issues in the grid computing environment, and specifically contributes to the research …

Home-centric visualization of network traffic for security administration

R Ball, GA Fink, C North - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
Today's system administrators, burdened by rapidly increasing network activity, must quickly
perceive the security state of their networks, but they often have only text-based tools to work …

Mobile security agents for network traffic analysis

D Dasgupta, H Brian - Proceedings DARPA Information …, 2001 - ieeexplore.ieee.org
This paper describes the implementation of a distributed agent architecture for intrusion
detection and response in networked computers. Unlike conventional intrusion detection …

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory

D Yu, D Frincke - Proceedings of the 43rd annual Southeast regional …, 2005 - dl.acm.org
Accurate identification of misuse is a key factor in determining appropriate ways to protect
systems. Modern intrusion detection systems often use alerts from different sources such as …

Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net

D Yu, D Frincke - Computer Networks, 2007 - Elsevier
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to
support rapid identification of ongoing attacks or predict an intruder's next likely goal. In this …

Managing runtime re-engineering of a system-of-systems for cyber security

A Waller, R Craddock - 2011 6th International conference on …, 2011 - ieeexplore.ieee.org
Cyber security is becoming an important topic due to the increasing recognition of its
potential consequences, both directly to the systems concerned and indirectly to society at …

Using naive Bayes with AdaBoost to enhance network anomaly intrusion detection

W Li, QX Li - 2010 Third International Conference on Intelligent …, 2010 - ieeexplore.ieee.org
Classical intrusion detection system tends to identify attacks by using a set of rules known as
signatures defined before the attack, this kind of detection is known as misuse intrusion …