Chad Heitzenrater
Publications by Year
Research Areas
Information and Cyber Security, Network Security and Intrusion Detection, Advanced Malware Detection Techniques, Cybersecurity and Cyber Warfare Studies, Advanced Steganography and Watermarking Techniques
Most-Cited Works
- Media Watermarking, Security, and Forensics 2012(2011)
- → Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach(2015)44 cited
- Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security(2011)
- → Policy, statistics and questions: Reflections on UK cyber security disclosures(2016)16 cited
- → A case for the economics of secure software development(2016)13 cited
- → When the Winning Move is Not to Play: Games of Deterrence in Cyber Security(2015)10 cited
- The Days Before Zero Day: Investment Models for Secure Software Engineering(2016)
- → Software Security Investment: The Right Amount of a Good Thing(2016)9 cited
- → Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems(2024)6 cited
- → Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements(2016)4 cited