Follow
Chad Heitzenrater
Chad Heitzenrater
Verified email at rand.org - Homepage
Title
Cited by
Cited by
Year
Cyber-threats information sharing in cloud computing: A game theoretic approach
C Kamhoua, A Martin, DK Tosh, KA Kwiat, C Heitzenrater, S Sengupta
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
462015
Policy, statistics and questions: Reflections on UK cyber security disclosures
CD Heitzenrater, AC Simpson
Journal of Cybersecurity 2 (1), 43-56, 2016
282016
The days before zero day: Investment models for secure software engineering
C Heitzenrater, R Böhme, A Simpson
Proceedings of the 15th Workshop on the Economics of Information Security …, 2016
232016
A case for the economics of secure software development
C Heitzenrater, A Simpson
Proceedings of the 2016 New Security Paradigms Workshop, 92-105, 2016
142016
When the winning move is not to play: Games of deterrence in cyber security
C Heitzenrater, G Taylor, A Simpson
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
122015
Software security investment: the right amount of a good thing
C Heitzenrater, A Simpson
2016 IEEE Cybersecurity Development (SecDev), 53-59, 2016
72016
Misuse, abuse and reuse: Economic utility functions for characterising security requirements
C Heitzenrater, A Simpson
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
Motivating security engineering with economics: A utility function approach
C Heitzenrater, J King-Lacroix, A Simpson
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
42016
Software security investment modelling for decision-support
C Heitzenrater
University of Oxford, 2017
22017
Application of conditional entropy measures to steganalysis
J Marsh, T Knapik, E Lo, C Heitzenrater
Security, Steganography, and Watermarking of Multimedia Contents VIII 6072 …, 2006
22006
A Methodology for Quantifying the Value of Cybersecurity Investments in the Navy
B Wilson, MV Arena, LA Mayer, CD Heitzenrater, J Mastbaum, ...
RAND Corporation, 2022
12022
Exploring Options to Improve Supply Chain Operations: A Review of Current Approaches and New Opportunities in Demand Forecasting, Robotic Process Automation, and Cyber Integrity
C Heitzenrater, J Steier, L Muggy, DA Goldfeld, CE Maerzluft, B DeBlois, ...
< bound method Organization. get_name_with_acronym of< Organization: RAND …, 2024
2024
Government Acquisition of Cyber Technologies: Lessons Derived from Analysis of the Cybersecurity and Infrastructure Security Agency's Cyber Acquisition Processes
J Dimarogonas, LL Rohn, Y Shokh, C Heitzenrater, QE Hodgson, ...
RAND Corporation, 2024
2024
Exploring Options to Improve Supply Chain Operations
JA LEFTWICH, DA GOLDFELD, B DEBLOIS, C HEITZENRATER, ...
2024
Government Acquisition of Cyber Technologies: Lessons Derived from Analysis of the Cybersecurity and Infrastructure Security Agency's Cyber Acquisition Processes
CD Heitzenrater, J Dimarogonas, K Bunch, FA Camm, R Consaul, ...
RAND, 2024
2024
Evaluating Cryptographic Vulnerabilities Created by Quantum Computing in Industrial Control Systems
MJD Vermeer, PA Stapleton, D Lumpkin, C Heitzenrater, A Moon, ...
RAND Corporation, 2023
2023
Creating Selective Overmatch: An Approach to Developing Cyberspace Options to Sustain US Primacy Against Revisionist Powers
T Wingfield, Q Hodgson, L Chao, B Downing, J Engstrom, D Grossman, ...
2023
Motivating security engineering with economics: a utility function approach
J King-Lacroix, C Heitzenrater, A Simpson
IEEE, 2016
2016
A government perspective on digital data embedding: taking a systems approach
C Heitzenrater
Proceedings of the 7th workshop on Multimedia and security, 77-78, 2005
2005
Characterization of steganographic algorithms using software metrics
C Heitzenrater
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–20