Skip to main content

Chad Heitzenrater : Publications

Click here to download all publications in a single bibtex file

@inproceedings{HeitzenraterEtAl2016,
  title = "The Days Before Zero Day: Investment Models for Secure Software Engineering",
  author = "Heitzenrater, C. and B{\"o}hme, R. and Simpson, A.",
  year = "2016",
  booktitle = "Proceedings of the 15th Workshop on the Economics of Information Security ({WEIS 2016})",
  howpublished = "To appear",
  location = "Berkeley, CA, USA",
  month = "June",
}
@article{Heitzenrater_and_Simpson_JoCS,
  title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures",
  author = "Chad Heitzenrater and Andrew Simpson",
  year = "2016",
  journal = "Journal of Cyber Security",
  doi = "10.1093/cybsec/tyw008",
}
@inproceedings{Heitzenrater_and_Simpson_2016_SecDev,
  title = "Software Security Investment: The Right Amount of a Good Thing",
  author = "Chad Heitzenrater and Andrew Simpson",
  year = "2016",
  booktitle = "Proceedings of the 1st IEEE Cybersecurity Development Conference ({SecDev 2016})",
}
@inproceedings{Heitzenrater_and_Simpson_NSPW2016,
  title = "A Case for the Economics of Secure Software Development",
  author = "Chad Heitzenrater and Andrew Simpson",
  year = "2016",
  booktitle = "Proceedings of NSPW 2016",
}
@inproceedings{Heitzenrater_and_Simpson_2016c,
  title = "Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements",
  author = "Heitzenrater, C. and Simpson, A.~C.",
  year = "2016",
  booktitle = "Proceedings of The Second International Workshop on Agile Secure Software Development ({ASSD 2016})",
}
@inproceedings{Heizenrater_and_Simpson_2016b,
  title = "Motivating Security Engineering with Economics: A Utility Function Approach",
  author = "Heitzenrater, C. and King-Lacroix, J. and Simpson, A.~C.",
  year = "2016",
  booktitle = "Proceedings of The 1st IEEE International Workshop on Cyber Resiliency Economics ({CRE 2016})",
}
@inproceedings{HeitzenraterSimpson2015,
  title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures",
  author = "Heitzenrater, C. and Simpson, A.",
  year = "2015",
  booktitle = "Proceedings of the 14th Annual Workshop on the Economics of Information Security ({WEIS 2015})",
  location = "Delft, Netherlands",
  month = "June",
}
@inproceedings{HeitzenraterEtAl2015,
  title = "When the Winning Move is Not to Play: Games of Deterrence in Cyber Security",
  author = "Heitzenrater, C. and Taylor, G. and Simpson, A.",
  year = "2015",
  booktitle = "Proceedings of the 6th International Conference on Decision and Game Theory for Security ({GameSec 2015})",
  location = "London, UK",
  month = "November",
  pages = "205--269",
}