![]() |
| 2008 | ||
|---|---|---|
| 7 | EE | Hulisi Ogut, Huseyin Cavusoglu, Srinivasan Raghunathan: Intrusion-Detection Policies for IT Security Breaches. INFORMS Journal on Computing 20(1): 112-123 (2008) |
| 2007 | ||
| 6 | EE | Xiaohang Yue, Srinivasan Raghunathan: The impacts of the full returns policy on a supply chain with information asymmetry. European Journal of Operational Research 180(2): 630-647 (2007) |
| 5 | EE | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan: Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. IEEE Trans. Software Eng. 33(3): 171-185 (2007) |
| 2004 | ||
| 4 | EE | Huseyin Cavusoglu, Birendra Mishra, Srinivasan Raghunathan: A model for evaluating IT security investments. Commun. ACM 47(7): 87-92 (2004) |
| 2003 | ||
| 3 | Huseyin Cavusoglu, Srinivasan Raghunathan: Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches. ICIS 2003: 692-705 | |
| 2 | EE | Srinivasan Raghunathan: Impact of demand correlation on the value of and incentives for information sharing in a supply chain. European Journal of Operational Research 146(3): 634-649 (2003) |
| 1992 | ||
| 1 | EE | Srinivasan Raghunathan: A Planning Aid: An Intelligent Modeling System for Planning Problems Based on Constraint Satisfaction. IEEE Trans. Knowl. Data Eng. 4(4): 317-335 (1992) |
| 1 | Hasan Cavusoglu | [5] |
| 2 | Huseyin Cavusoglu | [3] [4] [5] [7] |
| 3 | Birendra Mishra | [4] |
| 4 | Hulisi Ogut | [7] |
| 5 | Xiaohang Yue | [6] |