Voir la notice de l'article provenant de la source Math-Net.Ru
@article{CGTM_2007_1_a4, author = {Marco Cremonini and Dmitri Nizovtsev}, title = {Attackers{\textquoteright} {Motivation} and {Security} {Investment}}, journal = {Contributions to game theory and management}, pages = {43--67}, publisher = {mathdoc}, volume = {1}, year = {2007}, language = {en}, url = {http://geodesic.mathdoc.fr/item/CGTM_2007_1_a4/} }
Marco Cremonini; Dmitri Nizovtsev. Attackers’ Motivation and Security Investment. Contributions to game theory and management, Tome 1 (2007), pp. 43-67. http://geodesic.mathdoc.fr/item/CGTM_2007_1_a4/
[1] Akerlof G. A., “The market for 'lemons': Quality uncertainty and market mechanism”, Quarterly Journal of Economics, 84:3 (1970), 488–500 | DOI
[2] Anderson R. J., “Why information security is hard — an economic perspective”, Proc. of the 17th Annual Computer Security Applications Conference, IEEE Computer Society, 2001, 358
[3] Avizienis A., Laprie J., Randell B., Fundamental concepts of dependability, Tech. Rep. No 1145, LAAS-CNRS, 2001
[4] Avizienis A., Laprie J., Randell B., Landwehr C., “Basic concepts and taxonomy of dependable and secure computing”, IEEE Transactions on Dependable and Secure Computing, 1:1 (2004), 11–33 | DOI
[5] Beale J., Security Through Obscurity. Ain't what they think it is, , Bastille Linux, 2000 http://www.bastille-linux.org/jay/obscurity-revisited.html
[6] Bier V., Oliveros S., Samuelson L., “Choosing what to protect: Strategic defensive allocation against an unknown attacker”, Journal of Public Economic Theory, 9:4 (2007), 563–587 | DOI
[7] Cavusoglu H., Raghunathan S., “Configuration of detection software: A comparison of decision and game theory approaches”, Decision Analysis, 1:3 (2004), 131–148 | DOI
[8] Cavusoglu H., Mishra B., Raghunathan S., “A model for evaluating IT security investments”, Communications of the ACM, 47:7 (2004), 87–92 | DOI
[9] Cavusoglu H., Mishra B., Raghunathan S., “The value of intrusion detection systems in information technology security architecture”, Information Systems Research, 16:1 (2005), 28–46 | DOI
[10] Clemons E., “Evaluation of strategic investments in information technology”, Communications of the ACM, 34:1 (1991), 22–36 | DOI
[11] Cozzolino J., “Sequential search for an unknown number of objects of nonuniform size”, Operations Research, 20 (1972), 293–308 | DOI | Zbl
[12] Curry S., Bug Watch: Hacker motivation. Vnunet.com, , 2002 http://www.vnunet.com/vnunet/news/2117147/bug-watch-hacker-motivation?vnu_lt=vnu_art_related_articles
[13] Denning D., “Concerning hackers who break into computer systems”, Proc. of the 13th National Computer Security Conference (Washington, 1990), 1990, 653–664
[14] Enders W., Sandler T., What do we know about the substitution effect in transnational terrorism?, Researching Terrorism Trends, Achievements, Failures, Frank Cass, Ilford, UK, 2004
[15] Geer D., “Making choices to show ROI”, Secure Business Quarterly, 1:2 (2005), 1–4 http://sbq.com/sbq/rosi/sbq_rosi_making_choices.pdf
[16] Gordon L., Loeb M., “The economics of information security investment”, ACM Transactions on Information and System Security, 5:4 (2002), 438–457 | DOI
[17] Gordon L., Loeb M., Lucyshyn W., “Information security expenditures and real options: A wait-and-see approach”, Computer Security Journal, 19:2 (2003), 1–7
[18] Gordon L., Loeb M., Managing Cybersecurity Resources: A Cost-Benefit Analysis, McGraw-Hill, New York, 2005
[19] Gordon L. A., Richardson R., The new economics of information security, Information Week 53-56, , 2004 http://www.banktech.com/aml/showArticle.jhtml?articleID=18901266
[20] Jajodia S., Miller J., “Editor's preface”, Journal of Computer Security, 16:4 (1993), 43–53
[21] Jonsson E., Olovsson T., “A quantitative model of the security intrusion process based on attacker behavior”, IEEE Transactions on Software Engineering, 23:4 (1997), 235–245 | DOI
[22] Kearns M., Ortiz L., “Algorithms for Interdependent Security Games”, Advances in Neural Information Processing Systems, 16, MIT Press, 2004, 561–570
[23] Kuhnreuther H., Heal G., “Interdependent security”, The Journal of Risk and Uncertainty, 26:2/3 (2003), 231–249 | DOI
[24] Lee W., Xiang D., “Information-theoretic measures for anomaly detection”, Proc. of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Oakland, CA, 2001, 130–143
[25] Leeson P., Coyne C., “The economics of computer hacking”, Journal of Law, Economics and Policy, 1:2 (2006), 511–532
[26] Littlewood B., Brocklehurst S., Fenton N., Mellor P., Page S., Wright D., Dobson J., McDermid J., Gollmann D., “Towards operational measures of computer security”, Journal of Computer Security, 2 (1993), 211–229 | MR
[27] Liu P., Zang W., Yu M., “Incentive-based modeling and inference of attacker intent, objectives, and strategies”, ACM Transactions on Information and System Security, 8:1 (2005), 78–118 | DOI
[28] McDermott J., “Attack-potential-based survivability modeling for high-consequence systems”, Proc. of the Third IEEE Int. Information Assurance Workshop (Washington, DC, 2005), IEEE Computer Society, 119–130
[29] Nicol D., Sanders W., Trivedi K., “Model-based evaluation: From dependability to security”, IEEE Transactions on Dependable and Secure Computing, 1:1 (2004), 48–65 | DOI | MR
[30] Ning P., Cui Y., Reeves D., Xu D., “Techniques and tools for analyzing intrusion alerts”, ACM Transactions on Information and System Security, 7:2 (2004), 274-318 | DOI | MR
[31] Risk management guide for information technology systems, NIST 800-30, National Institute of Standards and Technology Special Publication, Gaithersburg, MD, 2002
[32] Ortalo R., Deswarte Y., Kaaniche M., “Experiments with quantitative evaluation tools for monitoring operational security”, IEEE Transactions on Software Engineering, 25:5 (1999), 633–650 | DOI
[33] Perens B., Why security-through-obscurity won't work, , Slashdot, 1998 http://slashdot.org/features/980720/0819202.shtml
[34] Purser S., “Improving the ROI of the security management process”, Journal of Computers Security, 23:7 (2004), 542–546 | DOI
[35] Rodewald G., “Aligning information security investments with a firm's risk tolerance”, Proc. of the Information Security Curriculum Development (InfoSecCD) Conference'05 (Kennesaw, GA, 2005), 139–141
[36] Schechter S., Smith M., “How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks”, Proc. of the Seventh International Financial Cryptography Conference (Gosier, Guadeloupe, 2003), 122–137
[37] Schechter S., Computer Security Strength and Risk: A Quantitative Approach, PhD thesis, Harvard University DEAS, 2004
[38] Schechter S., “Toward econometric models of the security risk from remote attack”, IEEE Security Privacy, 3:1 (2005), 40–44 | DOI
[39] Schneier B., Secrecy, security, and obscurity, , Crypto-Gram, 2002 http://www.schneier.com/crypto-gram-0205.html#1
[40] Sieberg D., Hackers shift focus to financial gain, , CNN, 2005 http://www.cnn.com/2005/TECH/internet/09/26/identity.hacker/
[41] Soo Hoo K., How Much Is Enough? A Risk-Management Approach to Computer Security, Doctoral dissertation, Stanford University School of Engineering, 2000
[42] Swire P., A model for when disclosure helps security: What is different about computer and network security?, Journal on Telecommunications and High Technology Law, 3:1 (2004), 163–208
[43] Valeur F., Vigna G., Kruegel C., Kemmerer R., “A comprehensive approach to intrusion detection alert correlation”, IEEE Transactions on Dependable and Secure Computing, 1:3 (2004), 146–169 | DOI
[44] Wells M., Thrower B., The importance of layered security. Symantec Corporation, , 2002 http://enterprisesecurity.symantec.com/article.cfm?articleid=769&EID=0
[45] Wespi A., Debar H., Dacier M., Nassehi M., “Fixed- vs. variable-length patterns for detecting suspicious process behavior”, Journal of Computer Security, 8:2/3 (2000), 1–15