Adaptive model of information security technique investment

被引:0
|
作者
Dong, Hong [1 ]
Qiu, Wan-Hua [1 ]
Lu, Jun-Jie [1 ]
Zhang, Wen [2 ]
机构
[1] School of Economics and Management, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
[2] School of Computer Science, Northwestern Polytechnical University, Xi'an 710072, China
来源
Kongzhi yu Juece/Control and Decision | 2008年 / 23卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
17
引用
收藏
页码:535 / 540
相关论文
共 50 条
  • [21] Grid Security-an Adaptive Technique
    Kalra, Anjali
    Singh, Sarbjeet
    Singh, Sukhvinder
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 272 - 276
  • [22] Information security investment with budget constraint and security information snaring in resource-snaring environments
    Gao, Xing
    Qiu, Manting
    Wang, Ying
    Wang, Xifan
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2023, 74 (06) : 1520 - 1535
  • [23] Security Modeling Technique: Visualizing Information of Security Plans
    Ley, D.
    Dalinger, E.
    TRANSNAV-INTERNATIONAL JOURNAL ON MARINE NAVIGATION AND SAFETY OF SEA TRANSPORTATION, 2011, 5 (04) : 417 - 422
  • [24] Adaptive security in complex information systems
    Shnitko, A
    KORUS 2003: 7TH KOREA-RUSSIA INTERNATIONAL SYMPOSIUM ON SCIENCE AND TECHNOLOGY, VOL 2, PROCEEDINGS: ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY, 2003, : 206 - 210
  • [25] Adaptive Monitoring of Companies' Information Security
    Lakhno, Valerii
    Adilzhanova, Saltanat
    Ydyryshbayeva, Moldir
    Turgynbayeva, Aliza
    Kryvoruchko, Olena
    Chubaievskyi, Vitalyi
    Desiatko, Alona
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2023, 69 (01) : 75 - 82
  • [26] Traceability for Adaptive Information Security in the Cloud
    Nhlabatsi, A.
    Tun, T.
    Khan, N.
    Yu, Y.
    Bandara, A.
    Khan, K.
    Nuseibehu, B.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 958 - 959
  • [27] ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security
    Mwakalinga, Jeffy
    Kowalski, Stewart
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 114 - 123
  • [28] Information Security Investment: Expected Utility Approach with Correlated Information Assets
    Park, Sungjune
    Mayadunne, Sanjaya
    AMCIS 2015 PROCEEDINGS, 2015,
  • [29] Optimal information security investment in a Healthcare Information Exchange: An economic analysis
    Huang, C. Derrick
    Behara, Ravi S.
    Goo, Jahyun
    DECISION SUPPORT SYSTEMS, 2014, 61 : 1 - 11
  • [30] The Correlation Analysis Model of Information Security Events Based on the Adaptive Optimization Algorithm
    Fang, Zhou
    Yu, Pengfei
    Feng, Zhuming
    INTERNATIONAL SYMPOSIUM ON ARTIFICIAL INTELLIGENCE AND ROBOTICS 2021, 2021, 11884