Cybersecurity strategies: The QuERIES methodology
Publication
, Journal Article
Carin, L; Cybenko, G; Hughes, J
Published in: Computer
August 27, 2008
QuERIES offers a novel multidisciplinary approach to quantifying risk associated with security technologies resulting in investment-efficient cybersecurity strategies. © 2008 IEEE.
Duke Scholars
Published In
Computer
DOI
ISSN
0018-9162
Publication Date
August 27, 2008
Volume
41
Issue
8
Start / End Page
20 / 26
Related Subject Headings
- Software Engineering
- 46 Information and computing sciences
- 08 Information and Computing Sciences
Citation
APA
Chicago
ICMJE
MLA
NLM
Carin, L., Cybenko, G., & Hughes, J. (2008). Cybersecurity strategies: The QuERIES methodology. Computer, 41(8), 20–26. https://doi.org/10.1109/MC.2008.295
Carin, L., G. Cybenko, and J. Hughes. “Cybersecurity strategies: The QuERIES methodology.” Computer 41, no. 8 (August 27, 2008): 20–26. https://doi.org/10.1109/MC.2008.295.
Carin L, Cybenko G, Hughes J. Cybersecurity strategies: The QuERIES methodology. Computer. 2008 Aug 27;41(8):20–6.
Carin, L., et al. “Cybersecurity strategies: The QuERIES methodology.” Computer, vol. 41, no. 8, Aug. 2008, pp. 20–26. Scopus, doi:10.1109/MC.2008.295.
Carin L, Cybenko G, Hughes J. Cybersecurity strategies: The QuERIES methodology. Computer. 2008 Aug 27;41(8):20–26.
Published In
Computer
DOI
ISSN
0018-9162
Publication Date
August 27, 2008
Volume
41
Issue
8
Start / End Page
20 / 26
Related Subject Headings
- Software Engineering
- 46 Information and computing sciences
- 08 Information and Computing Sciences