On Risk: Perception and Direction A Stewart Computers & Security 23 (5), 362-370, 2004 | 112 | 2004 |
The New School of Information Security A Shostack, A Stewart Addison-Wesley Professional, 2008 | 95 | 2008 |
Distributed Metastasis: A Computer Network Penetration Methodology AJ Stewart Phrack Magazine 9 (55), 1999 | 25 | 1999 |
A strict anomaly detection model for IDS B Sasha Phrack Magazine Volume 0xa Issue 0x38, May1 138, 2000 | 19 | 2000 |
A Utilitarian Re-Examination of Enterprise-Scale Information Security Management A Stewart Information and Computer Security 26 (1), 39-57, 2018 | 18 | 2018 |
Can Spending on Information Security be Justified? Evaluating the Security Spending Decision from the Perspective of a Rational Actor A Stewart Information Management & Computer Security 20 (4), 312-326, 2012 | 18 | 2012 |
Information Security Technologies as a Commodity Input A Stewart Information management & computer security 13 (1), 5-15, 2005 | 16 | 2005 |
A Vulnerable System: The History of Information Security in the Computer Age AJ Stewart Cornell University Press, 2021 | 7 | 2021 |
A Contemporary Approach to Network Vulnerability Assessment A Stewart Network Security 2005 (4), 7-10, 2005 | 5 | 2005 |
Efficient Visualization of Change Events in Enterprise Networks A Stewart 2006 Securecomm and Workshops, 1-6, 2006 | 2 | 2006 |
No Illusions: Rethinking Information Security Policies and Standards A Stewart Information Security Bulletin 8, 229-234, 2003 | | 2003 |