Action characteristics as predictors of competitive responses
Management Science
Cryptanalysis and protocol failures
Communications of the ACM
A taxonomy for key escrow encryption systems
Communications of the ACM
Security in computing
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security - IFIP 2000
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Proceedings of the 10th ACM conference on Computer and communications security
Incentive-based modeling and inference of attacker intent, objectives, and strategies
ACM Transactions on Information and System Security (TISSEC)
Competitor analysis and its defenses in the e-marketplace
Communications of the ACM - Spyware
Information security and risk management
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Maintaining defender's reputation in anomaly detection against insider attacks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Managing the investment in information security technology by use of a quantitative modeling
Information Processing and Management: an International Journal
Institutional Influences on Information Systems Security Innovations
Information Systems Research
Information Systems and e-Business Management
Hi-index | 48.22 |