Chad Heitzenrater : Publications
Click here to download all publications in a single bibtex file
@inproceedings{HeitzenraterEtAl2016,
title = "The Days Before Zero Day: Investment Models for Secure Software Engineering",
author = "Heitzenrater, C. and B{\"o}hme, R. and Simpson, A.",
year = "2016",
booktitle = "Proceedings of the 15th Workshop on the Economics of Information Security ({WEIS 2016})",
howpublished = "To appear",
location = "Berkeley, CA, USA",
month = "June",
}
@article{Heitzenrater_and_Simpson_JoCS,
title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures",
author = "Chad Heitzenrater and Andrew Simpson",
year = "2016",
journal = "Journal of Cyber Security",
doi = "10.1093/cybsec/tyw008",
}
@inproceedings{Heitzenrater_and_Simpson_2016_SecDev,
title = "Software Security Investment: The Right Amount of a Good Thing",
author = "Chad Heitzenrater and Andrew Simpson",
year = "2016",
booktitle = "Proceedings of the 1st IEEE Cybersecurity Development Conference ({SecDev 2016})",
}
@inproceedings{Heitzenrater_and_Simpson_NSPW2016,
title = "A Case for the Economics of Secure Software Development",
author = "Chad Heitzenrater and Andrew Simpson",
year = "2016",
booktitle = "Proceedings of NSPW 2016",
}
@inproceedings{Heitzenrater_and_Simpson_2016c,
title = "Misuse, Abuse, and Reuse: Economic utility functions for characterising security requirements",
author = "Heitzenrater, C. and Simpson, A.~C.",
year = "2016",
booktitle = "Proceedings of The Second International Workshop on Agile Secure Software Development ({ASSD 2016})",
}
@inproceedings{Heizenrater_and_Simpson_2016b,
title = "Motivating Security Engineering with Economics: A Utility Function Approach",
author = "Heitzenrater, C. and King-Lacroix, J. and Simpson, A.~C.",
year = "2016",
booktitle = "Proceedings of The 1st IEEE International Workshop on Cyber Resiliency Economics ({CRE 2016})",
}
@inproceedings{HeitzenraterSimpson2015,
title = "Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures",
author = "Heitzenrater, C. and Simpson, A.",
year = "2015",
booktitle = "Proceedings of the 14th Annual Workshop on the Economics of Information Security ({WEIS 2015})",
location = "Delft, Netherlands",
month = "June",
}
@inproceedings{HeitzenraterEtAl2015,
title = "When the Winning Move is Not to Play: Games of Deterrence in Cyber Security",
author = "Heitzenrater, C. and Taylor, G. and Simpson, A.",
year = "2015",
booktitle = "Proceedings of the 6th International Conference on Decision and Game Theory for Security ({GameSec 2015})",
location = "London, UK",
month = "November",
pages = "205--269",
}