Knowledge sharing and investment decisions in information security

D Liu, Y Ji, V Mookerjee - Decision Support Systems, 2011 - Elsevier
We study the relationship between decisions made by two similar firms pertaining to
knowledge sharing and investment in information security. The analysis shows that the …

An economic analysis of information security investment decision making for substitutable enterprises

X Li, Q Xue - Managerial and Decision Economics, 2021 - Wiley Online Library
As the competition among enterprises is increasingly fierce, the substitution of information
assets makes the behavior of hackers and enterprises more complicated in the information …

[PDF][PDF] A novel approach to intrusion detection system using rough set theory and incremental SVM

GP Dubey, N Gupta, RK Bhujade - International Journal of Soft Computing …, 2011 - Citeseer
Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted
attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a …

Information security investment decisions: evaluating the balanced scorecard method

LJ Tallau, M Gupta, R Sharman - International Journal of …, 2010 - inderscienceonline.com
Justifying security investments has been challenging for managers and executives alike for
several well-published reasons. With the growing importance of security measures …

Willingness to Pay for Smart Car Security

S Kwon, H Lee - IEEE Access, 2024 - ieeexplore.ieee.org
Smart cars have become more intelligent and technologically complex; however, consumers
have raised concerns about their security because of hacking and technical safety. Although …

An incremental SVM for intrusion detection based on key feature selection

YX Xia, ZC Shi, ZH Hu - 2009 Third International Symposium on …, 2009 - ieeexplore.ieee.org
Proposed a method of detecting intrusion using incremental SVM based on key feature
selection. A center SVM summarizes the distributed samples and incorporates them to build …

基于改进DS 证据融合与ELM 的入侵检测算法.

李永忠, 陈兴亮, 于化龙 - Application Research of …, 2016 - search.ebscohost.com
为了提高检测率, 采用Ds 证据融合技术融合多个ELM, 能够提高整个检测系统的精确性.
但是传统的Ds 技术处理冲突信息源时并不理想. 因此, 通过引入证据之间的冲突强度 …

基于相互认证和3DES 加密的智能卡远程支付系统认证方案.

莫淦清, 王国华 - Application Research of Computers …, 2016 - search.ebscohost.com
针对现有基于智能卡支付系统的安全方案存在密码暴露, 信息泄露和身份认证等问题,
提出一种新的基于相互认证和3DEs 加密的智能卡远程支付系统认证方案. 分析基于二次剩余的 …

A framework for distributed incremental intrusion detection based on SVM

YX Xia, ZH Hu, ZC Shi - 2009 Asia-Pacific Conference on …, 2009 - ieeexplore.ieee.org
In order to share the knowledge of intrusion among distributed hosts and make the intrusion
detect packages more efficient and reliable, a framework of distributed incremental intrusion …

[图书][B] 信息系统安全技术管理策略: 信息安全经济学视角

赵柳榕 - 2020 - books.google.com
Page 1 本专著受国家自然科学基金(项目号71801125); 江苏省社会科学基金(项目号17GLC008)资助
The Management Strategy of Information Systems Security Technology: An Information …