From post

Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches.

, и . ICIS, стр. 692-705. Association for Information Systems, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Two-Sided Sharing Platforms: Sell Upfront Subscriptions or Not?, , и . HICSS, стр. 3537-3546. ScholarSpace, (2023)The critical elements of patch management., и . SIGUCCS, стр. 98-101. ACM, (2005)Two-sided Adverse Selection and Bilateral Reviews in the Sharing Economy., , и . ICIS, Association for Information Systems, (2019)Should Firms Bundle Bloatware with Consumer Electronics? - Implications for Product Pricing and Consumer Surplus., , и . ICIS, Association for Information Systems, (2015)Bloatware and Jailbreaking: Strategic Impacts of Consumer-Initiated Modification of Technology Products., , и . Inf. Syst. Res., 31 (1): 240-257 (2020)Outsourcing Information Security: Contracting Issues and Security Implications., , и . WEIS, (2010)Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation., , и . IEEE Trans. Engineering Management, 54 (1): 12-28 (2007)Can Gamification Motivate Voluntary Contributions?: The Case of StackOverflow Q&A Community., , и . CSCW Companion, стр. 171-174. ACM, (2015)Special Issue: Immersive Systems., , и . J. Manag. Inf. Syst., 36 (3): 680-682 (2019)Privacy Controls and Disclosure Behavior., , , и . AMCIS, Association for Information Systems, (2015)