The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WEIS"( http://dblp.L3S.de/Venues/WEIS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/weis

Publication years (Num. hits)
2005 (39) 2006 (31) 2007 (28) 2008 (26) 2009 (22) 2010 (25) 2011 (21) 2012 (21) 2015 (22)
Publication types (Num. hits)
inproceedings(226) proceedings(9)
Venues (Conferences, Journals, ...)
WEIS(235)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 235 publication records. Showing 235 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David L. Baumer, Julia Brande Earp, J. C. Poindexter Quantifying Privacy Choices with Experimental Economics. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Jr. Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1 4th Annual Workshop on the Economics of Information Security, WEIS 2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005 Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Yooki Park, Suzanne Scotchmer Digital Rights Management and the Pricing of Digital Products. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Bernardo A. Huberman, Eytan Adar, Leslie R. Fine Valuating Privacy. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Tyler Moore 0001 Countering Hidden-Action Attacks on Networked Systems. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Scott Dynes, Hans Brechbühl, M. Eric Johnson Information Security in the Extended Enterprise: Some Initial Results From a Field Study of an Industrial Firm. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Ritesh Kumar Tiwari, Kamalakar Karlapalem Cost Tradeoffs for Information Security Assurance. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Dirk Bergemann, Thomas Eisenbach, Joan Feigenbaum, Scott Shenker Flexibility as an Instrument in Digital Rights Management. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Peter E. Sand The Privacy Value. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Zhulei Tang, Yu (Jeffrey) Hu, Michael D. Smith 0002 Protecting Online Privacy: Self-Regulation, Mandatory Standards, or Caveat Emptor. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Ashish Arora, Ramayya Krishnan, Rahul Telang, Yubao Yang An Empirical Analysis of Vendor Response to Disclosure Policy. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Avi Goldfarb Why Do Denial of Service Attacks Reduce Future Visits? Switching Costs vs. Changing Preferences. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Pei-Yu Sharon Chen, Gaurav Kataria, Ramayya Krishnan Software Diversity for Information Security. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Paul Judge, Dmitri Alperovitch, Weilai Yang Understanding and Reversing the Profit Model of Spam. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Andy Ozment The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1James R. Conrad Analyzing the Risks of Information Security Investments with Monte-Carlo Simulations. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Marco Cremonini, Patrizia Martini Evaluating Information Security Investments from Attackers Perspective: the Return-On-Attack (ROA). Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Dmitri Nizovtsev, Marie Thursby Economic Analysis of Incentives to Disclose Software Vulnerabilities. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan Emerging Issues in Responsible Vulnerability Disclosure. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Choong Hee Lee, Junseok Hwang Private Information Shielding Service for Overcoming Privacy Risk in Recommender System. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Rachel Greenstadt, Michael D. Smith 0001 Protecting Personal Information: Obstacles and Directions. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Hulisi Ögüt, Nirup M. Menon, Srinivasan Raghunathan Cyber Insurance and IT Security Investment: Impact of Interdependence Risk. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Rainer Böhme Cyber-Insurance Revisited. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Anindya Ghose, Arun Sundararajan Pricing Security Software: Theory and Evidence. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Adam Shostack Avoiding Liability: An Alternative Route to More Secure Products. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1George Danezis, Stephen Lewis, Ross J. Anderson How Much Is Location Privacy Worth? Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Byungcho Kim, Pei-Yu Sharon Chen, Tridas Mukhopadhyay An Economic Analysis of Software Market with Risk-Sharing Contract. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Jay P. Kesan, Ruperto P. Majuca, William Yurcik Cyber-insurance As A Market-Based Solution To The Problem Of Cybersecurity. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Christopher E. Everett Bridging the Gap Between Computer Security and Legal Requirements. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Jennifer S. Granick Faking It: Criminal Sanctions and the Cost of Computer Intrusions. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Jay Pil Choi, Chaim Fershtman, Neil Gandal Internet Security, Vulnerability Disclosure, and Software Provision. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Alessandro Acquisti, Jens Grossklags Uncertainty, Ambiguity and Privacy. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Pramod A. Jamkhedkar, Gregory L. Heileman The Role of Architecture in DRM Vendor Economics. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
1Andrei Serjantov, Richard Clayton 0001 Modeling Incentives for Email Blocking Strategies. Search on Bibsonomy WEIS The full citation details ... 2005 DBLP  BibTeX  RDF
Displaying result #201 - #235 of 235 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license