Intrusion Process Modeling for Security Quantification, 2009 International Conference on Availability, Reliability and Security, pp.114-121, 2009. ,
DOI : 10.1109/ARES.2009.142
A quantitative model of the security intrusion process based on attacker behavior, IEEE Transactions on Software Engineering, vol.23, issue.4, pp.235-245, 1997. ,
DOI : 10.1109/32.588541
Modeling and quantification of security attributes of software systems, Proceedings International Conference on Dependable Systems and Networks, pp.505-514, 2002. ,
DOI : 10.1109/DSN.2002.1028941
Time-to-Compromise Model for Cyber Risk Reduction Estimation, First Workshop on Quality of Protection, pp.49-64, 2005. ,
DOI : 10.1007/978-0-387-36584-8_5
Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), 2006. ,
DOI : 10.1109/HICSS.2006.405
Experimenting with quantitative evaluation tools for monitoring operational security, IEEE Transactions on Software Engineering, vol.25, issue.5, pp.633-650, 1999. ,
DOI : 10.1109/32.815323
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.3072
Optimising CAPTCHA Generation, 2011 Sixth International Conference on Availability, Reliability and Security, pp.740-745, 2011. ,
DOI : 10.1109/ARES.2011.114
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers, 2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 2005. ,
DOI : 10.1109/SAINTW.2005.1619988
Density-based spam detector, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.486-493, 2004. ,
DOI : 10.1145/1014052.1014107
Optimizing the Release Order of Defensive Mechanisms, 29 th Annual UK Performance Engineering Workshop ,
FRIARS: a Feedback Control System for Information Assurance Using a Markov Decision Process, 35th Annual 2001 International Carnahan Conference on Security Technology, pp.223-228, 2001. ,
An Intrusion Detection Game with Limited Observations, 12th International Symposium on Dynamic Games and Applications. France, 2006. ,
Game theory for cyber security, Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW '10, 2010. ,
DOI : 10.1145/1852666.1852704
Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric, 4th Int'l Conf. Mathematical Methods, Models, and Architectures for Computer Network Security, pp.213-227, 2007. ,
DOI : 10.1007/978-3-540-73986-9_18
The effects of information order and learning mode on schema abstraction, Memory & Cognition, vol.12, issue.1, pp.20-30, 1984. ,
DOI : 10.3758/BF03196994
Order of Presentation Effects in Learning Color Categories, Journal of Cognition and Development, vol.1, issue.2, pp.194-221, 2008. ,
DOI : 10.1006/jmla.1998.2566
Presentation order and recognition of categorically related examples, Psychonomic Bulletin & Review, vol.13, issue.2, pp.250-254, 1994. ,
DOI : 10.3758/BF03200776
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision, 2008 IEEE International Conference on Networking, Sensing and Control, pp.6-8, 2008. ,
DOI : 10.1109/ICNSC.2008.4525297
Adversarial machine learning, Proceedings of the 4th ACM workshop on Security and artificial intelligence, AISec '11, pp.43-58, 2011. ,
DOI : 10.1145/2046684.2046692
A rule-based presentation order facilitates category learning, Psychonomic Bulletin & Review, vol.50, issue.6, pp.1050-1057, 2009. ,
DOI : 10.3758/PBR.16.6.1050
URL : https://hal.archives-ouvertes.fr/hal-01358907
Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets, 2013 International Conference on Availability, Reliability and Security ,
DOI : 10.1109/ARES.2013.58
???The Cost Impact of Spam Filters: Measuring the Effect of Information System Technologies in Organizations, Information Systems Research, vol.23, issue.3-part-2, pp.1-13, 2012. ,
DOI : 10.1287/isre.1110.0396
Guide to Curriculum Design: Enquiry-Based Learning. Higher Education Academy, 2004. ,
Spam Filter Analysis, 19th IFIP International Information Security Conference, pp.395-410, 2004. ,
DOI : 10.1007/1-4020-8143-X_26
A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010. ,
DOI : 10.1109/HICSS.2010.35