Skip to main content

Cybersecurity strategies: The QuERIES methodology

Publication ,  Journal Article
Carin, L; Cybenko, G; Hughes, J
Published in: Computer
August 27, 2008

QuERIES offers a novel multidisciplinary approach to quantifying risk associated with security technologies resulting in investment-efficient cybersecurity strategies. © 2008 IEEE.

Duke Scholars

Published In

Computer

DOI

ISSN

0018-9162

Publication Date

August 27, 2008

Volume

41

Issue

8

Start / End Page

20 / 26

Related Subject Headings

  • Software Engineering
  • 46 Information and computing sciences
  • 08 Information and Computing Sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Carin, L., Cybenko, G., & Hughes, J. (2008). Cybersecurity strategies: The QuERIES methodology. Computer, 41(8), 20–26. https://doi.org/10.1109/MC.2008.295
Carin, L., G. Cybenko, and J. Hughes. “Cybersecurity strategies: The QuERIES methodology.” Computer 41, no. 8 (August 27, 2008): 20–26. https://doi.org/10.1109/MC.2008.295.
Carin L, Cybenko G, Hughes J. Cybersecurity strategies: The QuERIES methodology. Computer. 2008 Aug 27;41(8):20–6.
Carin, L., et al. “Cybersecurity strategies: The QuERIES methodology.” Computer, vol. 41, no. 8, Aug. 2008, pp. 20–26. Scopus, doi:10.1109/MC.2008.295.
Carin L, Cybenko G, Hughes J. Cybersecurity strategies: The QuERIES methodology. Computer. 2008 Aug 27;41(8):20–26.

Published In

Computer

DOI

ISSN

0018-9162

Publication Date

August 27, 2008

Volume

41

Issue

8

Start / End Page

20 / 26

Related Subject Headings

  • Software Engineering
  • 46 Information and computing sciences
  • 08 Information and Computing Sciences