//-->
Network externalities, layered protection and IT security risk management
Yue, Wei T., (2008)
The management of intrusion detection: Configuration, inspection, and investment
Çakanyıldırım, Metin, (2009)
A cost-based analysis of intrusion detection system configuration under active or passive response
Yue, Wei T., (2010)