Chad Heitzenrater

According to our database1, Chad Heitzenrater authored at least 10 papers between 2005 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Policy, statistics and questions: Reflections on UK cyber security disclosures.
J. Cybersecur., 2016

Software Security Investment: The Right Amount of a Good Thing.
Proceedings of the IEEE Cybersecurity Development, 2016

Motivating Security Engineering with Economics: A Utility Function Approach.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

A case for the economics of secure software development.
Proceedings of the 2016 New Security Paradigms Workshop, 2016

Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2006
Application of conditional entropy measures to steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Characterization of steganographic algorithms using software metrics.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A government perspective on digital data embedding: taking a systems approach.
Proceedings of the 7th workshop on Multimedia & Security, 2005


  Loading...