Security protection design for deception and real system regimes: A model and analysis
Author
Abstract
Suggested Citation
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Basso, Antonella & Peccati, Lorenzo A., 2001. "Optimal resource allocation with minimum activation levels and fixed costs," European Journal of Operational Research, Elsevier, vol. 131(3), pages 536-549, June.
- K. Sridhar Moorthy & I. P. L. Png, 1992. "Market Segmentation, Cannibalization, and the Timing of Product Introductions," Management Science, INFORMS, vol. 38(3), pages 345-359, March.
- Gordon, Lawrence A. & Loeb, Martin P. & Lucyshyn, William, 2003. "Sharing information on computer systems security: An economic analysis," Journal of Accounting and Public Policy, Elsevier, vol. 22(6), pages 461-485.
- Zeng, Daniel D. & Dror, Moshe & Chen, Hsinchun, 2006. "Efficient scheduling of periodic information monitoring requests," European Journal of Operational Research, Elsevier, vol. 173(2), pages 583-599, September.
- Fessi, B.A. & Hamdi, M. & Benabdallah, S. & Boudriga, N., 2007. "A decisional framework system for computer network intrusion detection," European Journal of Operational Research, Elsevier, vol. 177(3), pages 1824-1838, March.
- Berman, Oded & Gavious, Arieh, 2007. "Location of terror response facilities: A game between state and terrorist," European Journal of Operational Research, Elsevier, vol. 177(2), pages 1113-1133, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Lee, Sangjae & Costello, Francis Joseph & Lee, Kun Chang, 2021. "Hierarchical balanced scorecard-based organizational goals and the efficiency of controls processes," Journal of Business Research, Elsevier, vol. 132(C), pages 270-288.
- Ravi Sen & Joobin Choobineh & Subodha Kumar, 2020. "Determinants of Software Vulnerability Disclosure Timing," Production and Operations Management, Production and Operations Management Society, vol. 29(11), pages 2532-2552, November.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Kjell Hausken, 2017. "Information Sharing Among Cyber Hackers in Successive Attacks," International Game Theory Review (IGTR), World Scientific Publishing Co. Pte. Ltd., vol. 19(02), pages 1-33, June.
- ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
- Drezner, Zvi & Eiselt, H.A., 2024. "Competitive location models: A review," European Journal of Operational Research, Elsevier, vol. 316(1), pages 5-18.
- Ferrer, Geraldo & Swaminathan, Jayashankar M., 2010. "Managing new and differentiated remanufactured products," European Journal of Operational Research, Elsevier, vol. 203(2), pages 370-379, June.
- Weaver, Robert D. & Moon, Yongma, 2010. "Private Labels: A Mechanism For Fulfilling Consumer Demand For Healthy Food?," 115th Joint EAAE/AAEA Seminar, September 15-17, 2010, Freising-Weihenstephan, Germany 116397, European Association of Agricultural Economists.
- Shijie Lu & Xin (Shane) Wang & Neil Bendle, 2020. "Does Piracy Create Online Word of Mouth? An Empirical Analysis in the Movie Industry," Management Science, INFORMS, vol. 66(5), pages 2140-2162, May.
- Liberali, Guilherme & Gruca, Thomas S. & Nique, Walter M., 2011. "The effects of sensitization and habituation in durable goods markets," European Journal of Operational Research, Elsevier, vol. 212(2), pages 398-410, July.
- Berman, Oded & Gavious, Arieh & Menezes, Mozart B.C., 2012. "Optimal response against bioterror attack on airport terminal," European Journal of Operational Research, Elsevier, vol. 219(2), pages 415-424.
- Preyas Desai & Devavrat Purohit, 1998. "Leasing and Selling: Optimal Marketing Strategies for a Durable Goods Firm," Management Science, INFORMS, vol. 44(11-Part-2), pages 19-34, November.
- Chakravarthi Narasimhan & Z. John Zhang, 2000. "Market Entry Strategy Under Firm Heterogeneity and Asymmetric Payoffs," Marketing Science, INFORMS, vol. 19(4), pages 313-327, November.
- Hulisi Öğüt & Srinivasan Raghunathan & Nirup Menon, 2011. "Cyber Security Risk Management: Public Policy Implications of Correlated Risk, Imperfect Ability to Prove Loss, and Observability of Self‐Protection," Risk Analysis, John Wiley & Sons, vol. 31(3), pages 497-512, March.
- Zhang, Yibin & Hafezi, Maryam & Zhao, Xuan & Shi, Victor, 2017. "Reprint of “The impact of development cost on product line design and its environmental performance”," International Journal of Production Economics, Elsevier, vol. 194(C), pages 126-134.
- Kopalle, Praveen K. & Pauwels, Koen & Akella, Laxminarayana Yashaswy & Gangwar, Manish, 2023. "Dynamic pricing: Definition, implications for managers, and future research directions," Journal of Retailing, Elsevier, vol. 99(4), pages 580-593.
- Marion Rauner & Michaela Schaffhauser-Linzatti & Helmut Niessner, 2012. "Resource planning for ambulance services in mass casualty incidents: a DES-based policy model," Health Care Management Science, Springer, vol. 15(3), pages 254-269, September.
- José A. Novo‐Peteiro, 2023. "Product design with attribute dependence," Manchester School, University of Manchester, vol. 91(4), pages 361-385, July.
- Jalali, Hamed & Van den Broeke, Maud & Van Nieuwenhuyse, Inneke, 2022. "Platform and product design for markets with quality and feature sensitive customers," International Journal of Production Economics, Elsevier, vol. 244(C).
- Mazaher Kianpour & Stewart J. Kowalski & Harald Øverby, 2021. "Systematically Understanding Cybersecurity Economics: A Survey," Sustainability, MDPI, vol. 13(24), pages 1-28, December.
- Benjamin Engelstätter & Michael R. Ward, 2018.
"Strategic timing of entry: evidence from video games,"
Journal of Cultural Economics, Springer;The Association for Cultural Economics International, vol. 42(1), pages 1-22, February.
- Engelstätter, Benjamin & Ward, Michael R., 2013. "Strategic timing of entry: Evidence from video games," ZEW Discussion Papers 13-117, ZEW - Leibniz Centre for European Economic Research.
- Wilhelm, Wilbert E. & Xu, Kaihong, 2002. "Prescribing product upgrades, prices and production levels over time in a stochastic environment," European Journal of Operational Research, Elsevier, vol. 138(3), pages 601-621, May.
- Zhu, Wenge & He, Yuanjie, 2017. "Green product design in supply chains under competition," European Journal of Operational Research, Elsevier, vol. 258(1), pages 165-180.
More about this item
Keywords
Decision analysis Information security Deception system Economic model;Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:201:y:2010:i:2:p:545-556. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.