Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Privacy-preserving Analytics for Data Markets using MPCarXiv.org, 2021-032021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.03739Full text available |
|
2 |
Material Type: Article
|
Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic ScoresarXiv.org, 2022-082022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2208.12497Full text available |
|
3 |
Material Type: Article
|
A Threat-Intelligence Driven Methodology to Incorporate Uncertainty in Cyber Risk Analysis and Enhance Decision MakingarXiv.org, 2023-062023. This work is published under http://creativecommons.org/licenses/by-nc-sa/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-sa/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2302.13082Full text available |
|
4 |
Material Type: Article
|
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORASarXiv.org, 2022-122022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2212.10830Full text available |
|
5 |
Material Type: Article
|
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among EnterprisesarXiv.org, 2022-102022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2210.10581Full text available |
|
6 |
Material Type: Article
|
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk AnalysisarXiv.org, 2021-082021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.08742Full text available |
|
7 |
Material Type: Article
|
Measuring and Modeling the Free Content WebarXiv.org, 2023-042023. This work is published under http://creativecommons.org/licenses/by-nc-nd/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by-nc-nd/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2304.14359Full text available |
|
8 |
Material Type: Article
|
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning ModelsarXiv.org, 2021-072021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.02718Full text available |
|
9 |
Material Type: Article
|
Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor DiscoveryarXiv.org, 2022-022022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.07348Full text available |
|
10 |
Material Type: Article
|
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernelarXiv.org, 2021-112021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.06002Full text available |
|
11 |
Material Type: Article
|
Designing a Location Trace Anonymization ContestarXiv.org, 2022-092022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2107.10407Full text available |
|
12 |
Material Type: Article
|
MAGIC: A Method for Assessing Cyber Incidents OccurrencearXiv.org, 2022-062022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2206.11586Full text available |
|
13 |
Material Type: Article
|
Man-at-the-End Software Protection as a Risk Analysis ProcessarXiv.org, 2022-032022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.07269Full text available |
|
14 |
Material Type: Article
|
Accountability and Insurance in IoT Supply ChainarXiv.org, 2022-012022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2201.11855Full text available |
|
15 |
Material Type: Article
|
Quantitative Security Risk Modeling and Analysis with RisQFLanarXiv.org, 2021-012021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2101.08677Full text available |
|
16 |
Material Type: Article
|
A Unified View of IoT And CPS Security and PrivacyarXiv.org, 2022-092022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2209.13793Full text available |
|
17 |
Material Type: Article
|
Multi-factor authentication for users of non-internet based applications of blockchain-based platformsarXiv.org, 2020-102020. This work is published under http://creativecommons.org/publicdomain/zero/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/publicdomain/zero/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2010.07818Full text available |
|
18 |
Material Type: Article
|
Insider threat modeling: An adversarial risk analysis approacharXiv.org, 2019-112019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.09945Full text available |
|
19 |
Material Type: Article
|
Protecting from Malware Obfuscation Attacks through Adversarial Risk AnalysisarXiv.org, 2019-112019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.03653Full text available |
|
20 |
Material Type: Article
|
PriFi: Low-Latency Anonymity for Organizational NetworksarXiv.org, 2021-042021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1710.10237Full text available |