[1]
|
More than malware: unmasking the hidden risk of cybersecurity regulations
International Cybersecurity Law Review,
2024
DOI:10.1365/s43439-024-00111-7
|
|
|
[2]
|
Information sharing and security investment for substitutable firms: A game-theoretic analysis
Journal of the Operational Research Society,
2023
DOI:10.1080/01605682.2023.2210594
|
|
|
[3]
|
Cybersecurity For Defense Economists
Defence and Peace Economics,
2023
DOI:10.1080/10242694.2022.2138122
|
|
|
[4]
|
Cyberdefense
International Series in Operations Research & Management Science,
2023
DOI:10.1007/978-3-031-30191-9_1
|
|
|
[5]
|
Cyberdefense
International Series in Operations Research & Management Science,
2023
DOI:10.1007/978-3-031-30191-9_11
|
|
|
[6]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[7]
|
A study of detection of abnormal network traffic: A comparison of multiple algorithms
SECURITY AND PRIVACY,
2022
DOI:10.1002/spy2.190
|
|
|
[8]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[9]
|
Dangerous games: A literature review on cybersecurity investments
Journal of Economic Surveys,
2022
DOI:10.1111/joes.12456
|
|
|
[10]
|
Cybersecurity For Defense Economists
Defence and Peace Economics,
2022
DOI:10.1080/10242694.2022.2138122
|
|
|
[11]
|
The Best Laid Plans or Lack Thereof: Security Decision-Making of Different Stakeholder Groups
IEEE Transactions on Software Engineering,
2022
DOI:10.1109/TSE.2020.3023735
|
|
|
[12]
|
A study of detection of abnormal network traffic: A comparison of multiple algorithms
SECURITY AND PRIVACY,
2022
DOI:10.1002/spy2.190
|
|
|
[13]
|
Expanding the Gordon-Loeb model to cyber-insurance
Computers & Security,
2022
DOI:10.1016/j.cose.2021.102533
|
|
|
[14]
|
Cybersecurity Aspects of Location-Based Services (LBS) in 5G Networks
2021 IEEE 21st International Symposium on Computational Intelligence and Informatics (CINTI),
2021
DOI:10.1109/CINTI53070.2021.9668499
|
|
|
[15]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[16]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[17]
|
The Benefits and Costs of Cybersecurity Risk Reduction: A Dynamic Extension of the Gordon and Loeb Model
Risk Analysis,
2021
DOI:10.1111/risa.13713
|
|
|
[18]
|
Introducing the concept of cybersecurity footprint
Information & Computer Security,
2021
DOI:10.1108/ICS-04-2020-0054
|
|
|
[19]
|
Understanding incentives for cybersecurity investments: Development and application of a typology
Digital Business,
2021
DOI:10.1016/j.digbus.2021.100014
|
|
|
[20]
|
Systematically Understanding Cybersecurity Economics: A Survey
Sustainability,
2021
DOI:10.3390/su132413677
|
|
|
[21]
|
The Palgrave Handbook of Corporate Sustainability in the Digital Era
2021
DOI:10.1007/978-3-030-42412-1_7
|
|
|
[22]
|
Information Security Protection of Power System Computer Network
2021 IEEE Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC),
2021
DOI:10.1109/IPEC51340.2021.9421317
|
|
|
[23]
|
Analysis of Models for Selection of Investment Strategies
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T),
2020
DOI:10.1109/PICST51311.2020.9468024
|
|
|
[24]
|
Information security in healthcare supply chains: an analysis of critical information protection practices
Gestão & Produção,
2020
DOI:10.1590/0104-530x5376-20
|
|
|
[25]
|
Knowledge absorption for cyber-security
Computers in Human Behavior,
2020
DOI:10.1016/j.chb.2020.106255
|
|
|
[26]
|
ANALYSIS OF MATHEMATICAL MODELS OF INVESTMENT STRATEGIES IN THE UNIVERSITY
ON CYBER SECURITY SYSTEMS
THE BULLETIN,
2020
DOI:10.32014/2020.2518-1467.16
|
|
|
[27]
|
Quantifiable & Comparable Evaluations of Cyber Defensive Capabilities: A Survey & Novel, Unified Approach
Computers & Security,
2020
DOI:10.1016/j.cose.2020.101907
|
|
|
[28]
|
Cybersecurity in accounting research
Managerial Auditing Journal,
2019
DOI:10.1108/MAJ-09-2018-2004
|
|
|
[29]
|
Cybersecurity in Accounting Research
SSRN Electronic Journal ,
2019
DOI:10.2139/ssrn.3923245
|
|
|
[30]
|
Pricing Cyber Security Insurance: A Copula Model Using an Objective, Verifiable, Loss Measure
SSRN Electronic Journal ,
2018
DOI:10.2139/ssrn.3236512
|
|
|
[31]
|
Trade secrets and cyber security breaches
Journal of Accounting and Public Policy,
2018
DOI:10.1016/j.jaccpubpol.2018.10.006
|
|
|
[32]
|
MODEL OF INVESTMENT STRATEGIES IN CYBER SECURITY SYSTEMS OF TRANSPORT SITUATIONAL CENTERS
Cybersecurity: Education, Science, Technique,
2018
DOI:10.28925/2663-4023.2018.2.6879
|
|
|
[33]
|
Trade Secrets and Cybersecurity Breaches
SSRN Electronic Journal ,
2017
DOI:10.2139/ssrn.3018553
|
|
|
[34]
|
Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerability
European Journal of Operational Research,
2017
DOI:10.1016/j.ejor.2016.12.034
|
|
|
[35]
|
Estimation of externalities in interdependent security: A case study of large systems
2017 IEEE 56th Annual Conference on Decision and Control (CDC),
2017
DOI:10.1109/CDC.2017.8264242
|
|
|
[36]
|
Calibration of the Gordon-Loeb Models for the Probability of Security Breaches
2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim),
2017
DOI:10.1109/UKSim.2017.18
|
|
|
[37]
|
Security countermeasures in the cyber-world
2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF),
2016
DOI:10.1109/ICCCF.2016.7740440
|
|
|
[38]
|
Investing in Cybersecurity: Insights from the Gordon-Loeb Model
Journal of Information Security,
2016
DOI:10.4236/jis.2016.72004
|
|
|
[39]
|
Cybersecurity Investment Guidance: Extensions of the Gordon and Loeb Model
Journal of Information Security,
2016
DOI:10.4236/jis.2016.72002
|
|
|
[40]
|
Cybersecurity: Integrating Information into the Microeconomics of the Consumer and the Firm
Journal of Information Security,
2016
DOI:10.4236/jis.2016.75023
|
|
|
[41]
|
Information Security in the Cloud: Should We be Using a Different Approach?
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom),
2015
DOI:10.1109/CloudCom.2015.92
|
|
|
[42]
|
Computation, Cryptography, and Network Security
2015
DOI:10.1007/978-3-319-18275-9_16
|
|
|
[43]
|
Computation, Cryptography, and Network Security
2015
DOI:10.1007/978-3-319-18275-9_16
|
|
|