Control charting methods for autocorrelated cyber vulnerability data

Quality Engineering - Tập 28 Số 3 - Trang 313-328 - 2016
Anthony Afful‐Dadzie1, Theodore T. Allen2
1Business School, University of Ghana, Accra, Ghana
2Integrated Systems Engineering, The Ohio State University, Columbus, Ohio

Tóm tắt

Từ khóa


Tài liệu tham khảo

10.2307/1391421

Box, G.E.P., G.M. Jenkins, and Reinsel, G. C. 1994.Time series analysis: forecasting and control, 3rd ed. Englewood Cliffs, NJ: Prentice Hall.

Cox D. R., 1961, Journal of the Royal Statistical Society. Series B, 23, 414, 10.1111/j.2517-6161.1961.tb00424.x

10.1002/j.1538-7305.1928.tb01229.x

Dowdy, J. 2012. The cybersecurity threat to US growth and prosperity. InSecuring cyber space: a new domain for national security, eds. N. Burns and J. Price, Washington, DC: Aspen Institute.

Enders, C. K. 2010.Applied missing data analysis, New York: Guildford Press.

10.1002/qre.497

Montgomery, D. C. 2012.Introduction to statistical quality control. 7th ed. Hoboken, NJ: Wiley.

Mell P., 2007, Forum of Incident Response and Security Teams

Montgomery D. C., 1991, Journal of Quality Technology, 23, 179, 10.1080/00224065.1991.11979321

10.1080/08982110108918640

Runger G. C., 1995, Journal of Quality Technology, 27, 283, 10.1080/00224065.1995.11979608

Ponemon, L. 2010. Fifth Annual US Cost of Data Breach Study: Understanding Financial Impact, Customer Turnover and Preventive Solutions, Traverse City, MI: Ponemon Institute.