skip to main content
DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach

Authors:
ORCiD logo; ORCiD logo
Publication Date:
Sponsoring Org.:
USDOE
OSTI Identifier:
1634845
Grant/Contract Number:  
D2017-170222007
Resource Type:
Publisher's Accepted Manuscript
Journal Name:
Computers & Security
Additional Journal Information:
Journal Name: Computers & Security Journal Volume: 96 Journal Issue: C; Journal ID: ISSN 0167-4048
Publisher:
Elsevier
Country of Publication:
Country unknown/Code not available
Language:
English

Citation Formats

Iannacone, Michael D., and Bridges, Robert A. Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. Country unknown/Code not available: N. p., 2020. Web. https://doi.org/10.1016/j.cose.2020.101907.
Iannacone, Michael D., & Bridges, Robert A. Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. Country unknown/Code not available. https://doi.org/10.1016/j.cose.2020.101907
Iannacone, Michael D., and Bridges, Robert A. Tue . "Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach". Country unknown/Code not available. https://doi.org/10.1016/j.cose.2020.101907.
@article{osti_1634845,
title = {Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach},
author = {Iannacone, Michael D. and Bridges, Robert A.},
abstractNote = {},
doi = {10.1016/j.cose.2020.101907},
journal = {Computers & Security},
number = C,
volume = 96,
place = {Country unknown/Code not available},
year = {2020},
month = {9}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record
https://doi.org/10.1016/j.cose.2020.101907

Save / Share:

Works referenced in this record:

The Economics of Information Security
journal, October 2006


The Mayhem Cyber Reasoning System
journal, March 2018

  • Avgerinos, Thanassis; Brumley, David; Davis, John
  • IEEE Security & Privacy, Vol. 16, Issue 2
  • DOI: 10.1109/MSP.2018.1870873

The base-rate fallacy and the difficulty of intrusion detection
journal, August 2000

  • Axelsson, Stefan
  • ACM Transactions on Information and System Security, Vol. 3, Issue 3
  • DOI: 10.1145/357830.357849

About Penetration Testing
journal, November 2007


A Survey of Intrusion Detection Systems Leveraging Host Data
journal, January 2020

  • Bridges, Robert A.; Glass-Vanderlan, Tarrah R.; Iannacone, Michael D.
  • ACM Computing Surveys, Vol. 52, Issue 6
  • DOI: 10.1145/3344382

Return on security investment – proving it's worth it
journal, November 2005


Results of the KDD'99 classifier learning
journal, January 2000


An empirical comparison of botnet detection methods
journal, September 2014


The economics of information security investment
journal, November 2002

  • Gordon, Lawrence A.; Loeb, Martin P.
  • ACM Transactions on Information and System Security, Vol. 5, Issue 4
  • DOI: 10.1145/581271.581274

A multi-layered and kill-chain based security analysis framework for cyber-physical systems
journal, December 2015

  • Hahn, Adam; Thomas, Roshan K.; Lozano, Ivan
  • International Journal of Critical Infrastructure Protection, Vol. 11
  • DOI: 10.1016/j.ijcip.2015.08.003

ISRAM: information security risk analysis method
journal, March 2005


Coordination in Network Security Games: A Monotone Comparative Statics Approach
journal, December 2012


Estimating a System's Mean Time-to-Compromise
journal, January 2008

  • Leversage, David John; Byres, Eric James
  • IEEE Security & Privacy Magazine, Vol. 6, Issue 1
  • DOI: 10.1109/MSP.2008.9

Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
journal, November 2000

  • McHugh, John
  • ACM Transactions on Information and System Security, Vol. 3, Issue 4
  • DOI: 10.1145/382912.382923

How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
journal, September 2007

  • Mullins, Barry E.; Lacey, Timothy H.; Mills, Robert F.
  • IEEE Security & Privacy Magazine, Vol. 5, Issue 5
  • DOI: 10.1109/MSP.2007.111

Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
journal, October 2004

  • Sabhnani, Maheshkumar; Serpen, Gursel
  • Intelligent Data Analysis, Vol. 8, Issue 4
  • DOI: 10.3233/IDA-2004-8406

Towards a Reliable Intrusion Detection Benchmark Dataset
journal, January 2017


A New Proof of the Lyapunov Convexity Theorem
journal, March 1990

  • Tardella, Fabio
  • SIAM Journal on Control and Optimization, Vol. 28, Issue 2
  • DOI: 10.1137/0328026

The economic approach of information security
journal, March 2005