Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

[图书][B] Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

BB Gupta, A Dahiya - 2021 - taylorfrancis.com
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are
increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource …

To outsource or not: The impact of information leakage risk on information security strategy

N Feng, Y Chen, H Feng, D Li, M Li - Information & Management, 2020 - Elsevier
Emerging studies advocate that firms shall completely outsource their information security
for cost and technical advantages. However, the risk of information leakage in outsourcing to …

Managing information security outsourcing in a dynamic cooperation environment

Y Wu, GK Tayi, G Feng, RYK Fung - Journal of the Association for …, 2021 - aisel.aisnet.org
To efficiently manage information security, firms typically outsource part of their security
functions to a managed security service provider (MSSP) under a variety of contractual …

Decision making of optimal investment in information security for complementary enterprises based on game theory

X Li - Technology Analysis & Strategic Management, 2021 - Taylor & Francis
With the development of information technology and the deepening of enterprise
informatization, there are new challenges of enterprise information security investment …

Information security investment for complementary and substitutable firms: The role of technology similarity

X Gao, M Qiu, S Gong, Y Wang, Y Zhang - Expert Systems with Applications, 2023 - Elsevier
While technology similarity in network security aggravates breach interdependence, it can
improve the efficiency of security information sharing. This paper examines the effect of …

Information security decisions of firms considering security risk interdependency

Y Wu, L Wang, D Cheng, T Dai - Expert Systems with Applications, 2021 - Elsevier
Abstract Information security management becomes more challenging nowadays due to the
diverse security risk interdependency between firms. Prior researches rarely consider the …

A game-theoretical model of firm security reactions responding to a strategic hacker in a competitive industry

Y Wu, H Xiao, T Dai, D Cheng - Journal of the Operational …, 2022 - Taylor & Francis
The tendency of strategic hackers to attack specific industries brings new challenges for
information security management. This paper examines the interaction between firms in a …

Managing security outsourcing in the presence of strategic hackers

Y Wu, J Duan, T Dai, D Cheng - Decision Analysis, 2020 - pubsonline.informs.org
Nowadays, firms tend to outsource security operations to professional managed security
service providers (MSSPs) as a result of the sophistication of strategic hackers. Thus, how …

Information sharing and security investment for substitutable firms: A game-theoretic analysis

X Gao, S Gong, Y Wang, Y Zhang - Journal of the Operational …, 2024 - Taylor & Francis
There are several types of relations between information assets of two firms, among which
substitutable relation is such that even when one of the firms is successfully breached by …