This thesis contains work related to quantitative representation and analysis of computer and information security. The ability to accurately describe security using quantitative methods could offer better control and evaluation of security in operational settings. However, a number of challenges remain, generally in modeling but also in validation and usability. In this work, we improve knowledge about two identified challenges: (i) validation of methods and (ii) decision-making using quantified risk. The first part of the thesis critically surveys many of the proposed methods to quantitatively describe security, by focusing on their validity. After defining a taxonomy, we survey assumptions and methods for validation that have been used i...
In the information security business, 30 years of practical and theoretical research has resulted in...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
This thesis contains work related to quantitative representation and analysis of computer and inform...
This paper critically surveys previous work on quantitative representation and analysis of security....
This paper critically surveys previous work on quantitative representation and analysis of security....
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
Achieving the quantitative risk assessment has long been an elusive problem in information security,...
A mathematical framework is presented that describes risk in the context of safety and security prob...
This short note describes a number of methods for assessing security in a quantitative way. Next to ...
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
This paper presents main security risk assessment methodologies used in information technology. The ...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
This thesis contains work related to quantitative representation and analysis of computer and inform...
This paper critically surveys previous work on quantitative representation and analysis of security....
This paper critically surveys previous work on quantitative representation and analysis of security....
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
Achieving the quantitative risk assessment has long been an elusive problem in information security,...
A mathematical framework is presented that describes risk in the context of safety and security prob...
This short note describes a number of methods for assessing security in a quantitative way. Next to ...
The starting point of this research essay is a critical review of two methods to conduct a quantitat...
This paper presents main security risk assessment methodologies used in information technology. The ...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
In the information security business, 30 years of practical and theoretical research has resulted in...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...
The purpose of this paper is to investigate security decision-making during risk and uncertain condi...