Author of the publication

Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach.

, , , and . Decis. Support Syst., 41 (3): 592-603 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Rees, Jackie
add a person with the name Rees, Jackie
 

Other publications of authors with the same name

Brainstorming, Negotiating and Learning in Group Decision Support Systems: An Evolutionary Approach., and . HICSS, IEEE Computer Society, (1999)Simulating Sellers' Behavior in a Reverse Auction B2B Exchange., , , , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 365-374. Springer, (2003)Learning genetic algorithm parameters using hidden Markov models., and . European Journal of Operational Research, 175 (2): 806-820 (2006)The State of Risk Assessment Practices in Information Security: An Exploratory Investigation., and . J. Org. Computing and E. Commerce, 18 (4): 255-277 (2008)Modeling search in group decision support systems., and . IEEE Trans. Systems, Man, and Cybernetics, Part C, 34 (3): 237-244 (2004)Simulating sellers in online exchanges., , and . Decis. Support Syst., 41 (2): 500-513 (2006)Management of Information Security: Challenges and Research Directions., , , and . CAIS, (2007)PFIRES: a policy framework for information security., , and . Commun. ACM, 46 (7): 101-106 (2003)Market Reactions to Information Security Breach Announcements: An Empirical Analysis., , and . Int. J. Electronic Commerce, 12 (1): 69-91 (2007)Software Vulnerabilities: Open Source versus Proprietary Software Security., , and . AMCIS, page 428. Association for Information Systems, (2005)