skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 44  for All Library Resources

Results 1 2 3 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Privacy-preserving Analytics for Data Markets using MPC
Material Type:
Article
Add to My Research

Privacy-preserving Analytics for Data Markets using MPC

arXiv.org, 2021-03

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.03739

Full text available

2
Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores
Material Type:
Article
Add to My Research

Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores

arXiv.org, 2022-08

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2208.12497

Full text available

3
A Threat-Intelligence Driven Methodology to Incorporate Uncertainty in Cyber Risk Analysis and Enhance Decision Making
Material Type:
Article
Add to My Research

A Threat-Intelligence Driven Methodology to Incorporate Uncertainty in Cyber Risk Analysis and Enhance Decision Making

arXiv.org, 2023-06

2023. This work is published under http://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-sa/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2302.13082

Full text available

4
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
Material Type:
Article
Add to My Research

A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS

arXiv.org, 2022-12

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2212.10830

Full text available

5
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Material Type:
Article
Add to My Research

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises

arXiv.org, 2022-10

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2210.10581

Full text available

6
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis
Material Type:
Article
Add to My Research

Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis

arXiv.org, 2021-08

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.08742

Full text available

7
Measuring and Modeling the Free Content Web
Material Type:
Article
Add to My Research

Measuring and Modeling the Free Content Web

arXiv.org, 2023-04

2023. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-nd/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2304.14359

Full text available

8
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models
Material Type:
Article
Add to My Research

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

arXiv.org, 2021-07

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.02718

Full text available

9
Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery
Material Type:
Article
Add to My Research

Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery

arXiv.org, 2022-02

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.07348

Full text available

10
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel
Material Type:
Article
Add to My Research

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel

arXiv.org, 2021-11

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.06002

Full text available

11
Designing a Location Trace Anonymization Contest
Material Type:
Article
Add to My Research

Designing a Location Trace Anonymization Contest

arXiv.org, 2022-09

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2107.10407

Full text available

12
MAGIC: A Method for Assessing Cyber Incidents Occurrence
Material Type:
Article
Add to My Research

MAGIC: A Method for Assessing Cyber Incidents Occurrence

arXiv.org, 2022-06

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2206.11586

Full text available

13
Man-at-the-End Software Protection as a Risk Analysis Process
Material Type:
Article
Add to My Research

Man-at-the-End Software Protection as a Risk Analysis Process

arXiv.org, 2022-03

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.07269

Full text available

14
Accountability and Insurance in IoT Supply Chain
Material Type:
Article
Add to My Research

Accountability and Insurance in IoT Supply Chain

arXiv.org, 2022-01

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2201.11855

Full text available

15
Quantitative Security Risk Modeling and Analysis with RisQFLan
Material Type:
Article
Add to My Research

Quantitative Security Risk Modeling and Analysis with RisQFLan

arXiv.org, 2021-01

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2101.08677

Full text available

16
A Unified View of IoT And CPS Security and Privacy
Material Type:
Article
Add to My Research

A Unified View of IoT And CPS Security and Privacy

arXiv.org, 2022-09

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2209.13793

Full text available

17
Multi-factor authentication for users of non-internet based applications of blockchain-based platforms
Material Type:
Article
Add to My Research

Multi-factor authentication for users of non-internet based applications of blockchain-based platforms

arXiv.org, 2020-10

2020. This work is published under http://creativecommons.org/publicdomain/zero/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/publicdomain/zero/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2010.07818

Full text available

18
Insider threat modeling: An adversarial risk analysis approach
Material Type:
Article
Add to My Research

Insider threat modeling: An adversarial risk analysis approach

arXiv.org, 2019-11

2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.09945

Full text available

19
Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Material Type:
Article
Add to My Research

Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis

arXiv.org, 2019-11

2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.03653

Full text available

20
PriFi: Low-Latency Anonymity for Organizational Networks
Material Type:
Article
Add to My Research

PriFi: Low-Latency Anonymity for Organizational Networks

arXiv.org, 2021-04

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1710.10237

Full text available

Results 1 - 20 of 44  for All Library Resources

Results 1 2 3 next page

Searching Remote Databases, Please Wait