2008 | ||
---|---|---|
7 | EE | Hulisi Ogut, Huseyin Cavusoglu, Srinivasan Raghunathan: Intrusion-Detection Policies for IT Security Breaches. INFORMS Journal on Computing 20(1): 112-123 (2008) |
2007 | ||
6 | EE | Xiaohang Yue, Srinivasan Raghunathan: The impacts of the full returns policy on a supply chain with information asymmetry. European Journal of Operational Research 180(2): 630-647 (2007) |
5 | EE | Hasan Cavusoglu, Huseyin Cavusoglu, Srinivasan Raghunathan: Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge. IEEE Trans. Software Eng. 33(3): 171-185 (2007) |
2004 | ||
4 | EE | Huseyin Cavusoglu, Birendra Mishra, Srinivasan Raghunathan: A model for evaluating IT security investments. Commun. ACM 47(7): 87-92 (2004) |
2003 | ||
3 | Huseyin Cavusoglu, Srinivasan Raghunathan: Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches. ICIS 2003: 692-705 | |
2 | EE | Srinivasan Raghunathan: Impact of demand correlation on the value of and incentives for information sharing in a supply chain. European Journal of Operational Research 146(3): 634-649 (2003) |
1992 | ||
1 | EE | Srinivasan Raghunathan: A Planning Aid: An Intelligent Modeling System for Planning Problems Based on Constraint Satisfaction. IEEE Trans. Knowl. Data Eng. 4(4): 317-335 (1992) |
1 | Hasan Cavusoglu | [5] |
2 | Huseyin Cavusoglu | [3] [4] [5] [7] |
3 | Birendra Mishra | [4] |
4 | Hulisi Ogut | [7] |
5 | Xiaohang Yue | [6] |