Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach
- Authors:
- Publication Date:
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1634845
- Grant/Contract Number:
- D2017-170222007
- Resource Type:
- Publisher's Accepted Manuscript
- Journal Name:
- Computers & Security
- Additional Journal Information:
- Journal Name: Computers & Security Journal Volume: 96 Journal Issue: C; Journal ID: ISSN 0167-4048
- Publisher:
- Elsevier
- Country of Publication:
- Country unknown/Code not available
- Language:
- English
Citation Formats
Iannacone, Michael D., and Bridges, Robert A. Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. Country unknown/Code not available: N. p., 2020.
Web. doi:10.1016/j.cose.2020.101907.
Iannacone, Michael D., & Bridges, Robert A. Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. Country unknown/Code not available. https://doi.org/10.1016/j.cose.2020.101907
Iannacone, Michael D., and Bridges, Robert A. Tue .
"Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach". Country unknown/Code not available. https://doi.org/10.1016/j.cose.2020.101907.
@article{osti_1634845,
title = {Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach},
author = {Iannacone, Michael D. and Bridges, Robert A.},
abstractNote = {},
doi = {10.1016/j.cose.2020.101907},
journal = {Computers & Security},
number = C,
volume = 96,
place = {Country unknown/Code not available},
year = {Tue Sep 01 00:00:00 EDT 2020},
month = {Tue Sep 01 00:00:00 EDT 2020}
}
Free Publicly Available Full Text
Publisher's Version of Record
https://doi.org/10.1016/j.cose.2020.101907
https://doi.org/10.1016/j.cose.2020.101907
Other availability
Cited by: 3 works
Citation information provided by
Web of Science
Web of Science
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.
Works referenced in this record:
The Economics of Information Security
journal, October 2006
- Anderson, R.; Moore, T.
- Science, Vol. 314, Issue 5799
The Mayhem Cyber Reasoning System
journal, March 2018
- Avgerinos, Thanassis; Brumley, David; Davis, John
- IEEE Security & Privacy, Vol. 16, Issue 2
The base-rate fallacy and the difficulty of intrusion detection
journal, August 2000
- Axelsson, Stefan
- ACM Transactions on Information and System Security, Vol. 3, Issue 3
About Penetration Testing
journal, November 2007
- Bishop, Matt
- IEEE Security & Privacy Magazine, Vol. 5, Issue 6
A Survey of Intrusion Detection Systems Leveraging Host Data
journal, January 2020
- Bridges, Robert A.; Glass-Vanderlan, Tarrah R.; Iannacone, Michael D.
- ACM Computing Surveys, Vol. 52, Issue 6
Return on security investment – proving it's worth it
journal, November 2005
- Davis, Adrian
- Network Security, Vol. 2005, Issue 11
Results of the KDD'99 classifier learning
journal, January 2000
- Elkan, Charles
- ACM SIGKDD Explorations Newsletter, Vol. 1, Issue 2
An empirical comparison of botnet detection methods
journal, September 2014
- García, S.; Grill, M.; Stiborek, J.
- Computers & Security, Vol. 45
The economics of information security investment
journal, November 2002
- Gordon, Lawrence A.; Loeb, Martin P.
- ACM Transactions on Information and System Security, Vol. 5, Issue 4
A multi-layered and kill-chain based security analysis framework for cyber-physical systems
journal, December 2015
- Hahn, Adam; Thomas, Roshan K.; Lozano, Ivan
- International Journal of Critical Infrastructure Protection, Vol. 11
ISRAM: information security risk analysis method
journal, March 2005
- Karabacak, Bilge; Sogukpinar, Ibrahim
- Computers & Security, Vol. 24, Issue 2
Coordination in Network Security Games: A Monotone Comparative Statics Approach
journal, December 2012
- Lelarge, Marc
- IEEE Journal on Selected Areas in Communications, Vol. 30, Issue 11
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
journal, November 2000
- McHugh, John
- ACM Transactions on Information and System Security, Vol. 3, Issue 4
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
journal, September 2007
- Mullins, Barry E.; Lacey, Timothy H.; Mills, Robert F.
- IEEE Security & Privacy Magazine, Vol. 5, Issue 5
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
journal, October 2004
- Sabhnani, Maheshkumar; Serpen, Gursel
- Intelligent Data Analysis, Vol. 8, Issue 4
Towards a Reliable Intrusion Detection Benchmark Dataset
journal, January 2017
- Sharafaldin, Iman; Gharib, Amirhossein; Lashkari, Arash Habibi
- Software Networking, Vol. 2017, Issue 1
A New Proof of the Lyapunov Convexity Theorem
journal, March 1990
- Tardella, Fabio
- SIAM Journal on Control and Optimization, Vol. 28, Issue 2
The economic approach of information security
journal, March 2005
- Tsiakis, Theodosios; Stephanides, George
- Computers & Security, Vol. 24, Issue 2