Oldest pages
Jump to navigation
Jump to search
Showing below up to 50 results in range #1 to #50.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Glossary (16:40, 20 May 2010)
- Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software (15:47, 2 June 2010)
- Private Versus Social Incentives in Cybersecurity: Law and Economics (21:30, 2 June 2010)
- A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems (19:29, 3 June 2010)
- A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security (14:59, 4 June 2010)
- Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers (15:05, 4 June 2010)
- Economics of Malware: Security Decisions, Incentives and Externalities (14:22, 8 June 2010)
- The Law and Economics of Cybersecurity: An Introduction (14:42, 8 June 2010)
- Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games (15:46, 9 June 2010)
- Cybersecurity: Preventing Terrorist Attacks and Protecting Privacy in Cyberspace (15:28, 10 June 2010)
- Global Cyber Deterrence Views from China (18:47, 11 June 2010)
- Global Cyber Deterrence (19:27, 11 June 2010)
- The Need for a National Cybersecurity Research and Development Agenda (19:48, 11 June 2010)
- Cybersecurity and Economic Incentives (13:45, 14 June 2010)
- Estonia Three Years Later (18:49, 14 June 2010)
- Cyber security and regulation in the United States (21:31, 15 June 2010)
- Cyber Security and Regulation in the United States (21:31, 15 June 2010)
- Experiences and Challenges with Using CERT Data to Analyze International Cyber Security (14:27, 16 June 2010)
- Current Cyber Sector-Specific Planning Approach Needs Reassessment (19:01, 16 June 2010)
- Cybersecurity (14:18, 17 June 2010)
- The Government and Cybersecurity (14:19, 17 June 2010)
- Evolving Cybersecurity Issues in the Utility Industry (14:22, 17 June 2010)
- Best Practices for Data Protection and Privacy (14:23, 17 June 2010)
- World War 3.0: Ten Critical Trends for Cybersecurity (14:28, 17 June 2010)
- Cyberspace and the National Security of the United Kingdom (14:30, 17 June 2010)
- Critical Infrastructure Protection (14:51, 17 June 2010)
- Cyber-Apocalypse Now (14:54, 17 June 2010)
- Terrorist Capabilities for Cyberattack (14:56, 17 June 2010)
- Making the Best Use of Cybersecurity Economic Models (15:00, 17 June 2010)
- A Framework for Linking Cybersecurity Metrics to the Modeling of Macroeconomic Interdependencies (15:02, 17 June 2010)
- Metrics for Mitigating Cybersecurity Threats to Networks (15:05, 17 June 2010)
- The Evolving Landscape of Maritime Cybersecurity (15:06, 17 June 2010)
- Cybersecurity: Current Legislation, Executive Branch Initiatives, and Options for Congress (15:09, 17 June 2010)
- Continued Efforts are Needed to Protect Information Systems from Evolving Threats (15:10, 17 June 2010)
- Information Security (15:18, 17 June 2010)
- Introduction to Country Reports (15:49, 17 June 2010)
- Nothing Ventured, Nothing Gained (16:03, 17 June 2010)
- Nuclear Security (18:43, 17 June 2010)
- An Economic Analysis of the Private and Social Costs of the Provision of Cybersecurity and other Public Security Goods (15:20, 18 June 2010)
- Emerging Threats to Internet Security (18:24, 18 June 2010)
- The Market Consequences of Cybersecurity (18:24, 18 June 2010)
- Does Information Security Attack Frequency Increase With Vulnerability Disclosure - An Empirical Analysis (19:18, 23 June 2010)
- Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks (15:47, 25 June 2010)
- Cybersecurity, Identity Theft, and the Limits of Tort Liability (21:04, 25 June 2010)
- Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - An Empirical Investigation (21:17, 29 June 2010)
- Security Components of Classic Cyberissues (e.g. IP) (16:27, 30 June 2010)
- Hard Problem List (14:31, 9 July 2010)
- Amending The ECPA To Enable a Culture of Cybersecurity Research (19:32, 9 July 2010)
- Broad Topics (16:11, 21 July 2010)
- Strategy for Homeland Defense and Civil Support (19:59, 23 July 2010)