2021 | Information Systems Frontiers | Citations: 0
Authors: Hausken, Kjell; Welburn, Jonathan W.
Abstract: Two players strike balances between allocating resources for defense and product ... Expand
Semantic filters: zero-day vulnerability
Topics: zero-day vulnerability accounting anonymity
Methods: simulation
2021 | Americas Conference on Information Systems | Citations: 0
Authors: McOsker, Caitlin; Handlin, Michael; Li, Lei; Shahriar, Hossain; Zhao, Liang
Abstract: Intrusion Detection Systems (IDSs) are essential part of a security solution to ... Expand
Semantic filters: zero-day vulnerability
Topics: privacy intrusion detection system zero-day vulnerability open source open source software project
Methods: machine learning federated learning experiment design artifact computational algorithm
2020 | Communications of the Association for Information Systems | Citations: 1
Authors: Roumani, Yaman; Nwankpa, Joseph
Abstract: With the increasing number and severity of security incidents and exploits, info ... Expand
Semantic filters: zero-day vulnerability
Topics: electronic authentication research and development database system privacy SQL injection
Methods: regression analysis method survival analysis proportional hazards model game theoretical model Compustat
Theories: game theory theory of bounded rationality
2018 | Decision Support Systems | Citations: 11
Authors: Smadi, Sami; Aslam, Nauman; Zhang, Li
Abstract: Despite state-of-the-art solutions to detect phishing attacks, there is still a ... Expand
Semantic filters: zero-day vulnerability
Topics: electronic mail phishing email phishing email spam systems development
Methods: computational algorithm experiment machine learning decision tree classification reinforcement learning
2015 | Information Systems Research | Citations: 32
Authors: Mitra, Sabyasachi; Ransbotham, Sam
Abstract: With the nearly instantaneous dissemination of information in the modern era, po ... Expand
Semantic filters: zero-day vulnerability
Topics: innovation management intrusion detection system database system data security diffusion of innovation
Methods: longitudinal research mathematical model proportional hazards model regression analysis method Poisson regression
2012 | Information Systems Frontiers | Citations: 0
Authors: Reddy, K.; Venter, H. S.; Olivier, M. S.
Abstract: A digital forensic readiness (DFR) programme consists of a number of activities ... Expand
Semantic filters: zero-day vulnerability
Topics: firewall data security decision making privacy Java
Methods: simulation literature study survey stochastic simulation computational algorithm