Follow
Andrew Stewart
Title
Cited by
Cited by
Year
On Risk: Perception and Direction
A Stewart
Computers & Security 23 (5), 362-370, 2004
1122004
The New School of Information Security
A Shostack, A Stewart
Addison-Wesley Professional, 2008
952008
Distributed Metastasis: A Computer Network Penetration Methodology
AJ Stewart
Phrack Magazine 9 (55), 1999
251999
A strict anomaly detection model for IDS
B Sasha
Phrack Magazine Volume 0xa Issue 0x38, May1 138, 2000
202000
A Utilitarian Re-Examination of Enterprise-Scale Information Security Management
A Stewart
Information and Computer Security 26 (1), 39-57, 2018
182018
Can Spending on Information Security be Justified? Evaluating the Security Spending Decision from the Perspective of a Rational Actor
A Stewart
Information Management & Computer Security 20 (4), 312-326, 2012
182012
Information Security Technologies as a Commodity Input
A Stewart
Information management & computer security 13 (1), 5-15, 2005
162005
A Vulnerable System: The History of Information Security in the Computer Age
AJ Stewart
Cornell University Press, 2021
72021
A Contemporary Approach to Network Vulnerability Assessment
A Stewart
Network Security 2005 (4), 7-10, 2005
52005
Efficient Visualization of Change Events in Enterprise Networks
A Stewart
2006 Securecomm and Workshops, 1-6, 2006
22006
No Illusions: Rethinking Information Security Policies and Standards
A Stewart
Information Security Bulletin 8, 229-234, 2003
2003
The system can't perform the operation now. Try again later.
Articles 1–11