Toward econometric models of the security risk from remote attacks

@article{Schechter2005TowardEM,
  title={Toward econometric models of the security risk from remote attacks},
  author={Stuart E. Schechter},
  journal={IEEE Security & Privacy},
  year={2005},
  volume={3},
  pages={40-44}
}
Security risk models have successfully estimated the likelihood of attack for simple security threats such as burglary and auto theft. Before we can forecast the risks to computer systems, we must first learn to measure the strength of their security 
Highly Cited
This paper has 82 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 55 extracted citations

IT security risk management

ACM Southeast Regional Conference • 2008
View 4 Excerpts
Highly Influenced

DDoS attack volume forecasting using a statistical approach

2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) • 2017
View 2 Excerpts

A classification of threats to remote online examinations

2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) • 2016
View 1 Excerpt

Software Security Investment: The Right Amount of a Good Thing

2016 IEEE Cybersecurity Development (SecDev) • 2016
View 1 Excerpt

82 Citations

0510'06'09'12'15'18
Citations per Year
Semantic Scholar estimates that this publication has 82 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 27 references

A framework for understanding and predicting insider attacks

E. Eugene Schultz
Computers & Security, • 2002
View 1 Excerpt

How to 0wn the Internet in your spare time

Stuart Staniford, Vern Paxson, Nicholas Weaver
In Proceedings of the 11th USENIX Security Symposium, • 2002
View 1 Excerpt

How to Buy Better Testing

InfraSec • 2002
View 1 Excerpt

Quantitatively differentiating system security

Stuart E. Schechter
In The First Workshop on Economics and Information Security, May 16-17, • 2002
View 2 Excerpts

A Trend Analysis of Exploitations

IEEE Symposium on Security and Privacy • 2001
View 1 Excerpt

A simulation model for managing survivability of networked information systems

Soumyo D. Moitra, Suresh L. Konda
Technical Report ESC-TR- 2000-020, • 2000
View 1 Excerpt

Knowing your odds: Home burglary and the odds ratio

Simon Hakim, George F. Rengert, Yochanan Shachmurove
Technical Report CARESS Working Paper 00-14, • 2000
View 2 Excerpts

The survivability of network systems: An empirical analysis

Sournyo D. Moitra, Suresh L. Konda
Technical Report CMU/SEI-2000-TR-021, • 2000
View 1 Excerpt

Similar Papers

Loading similar papers…