skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 40  for All Library Resources

Results 1 2 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Privacy-preserving Analytics for Data Markets using MPC
Material Type:
Article
Add to My Research

Privacy-preserving Analytics for Data Markets using MPC

arXiv.org, 2021-03

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.03739

Full text available

2
Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores
Material Type:
Article
Add to My Research

Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores

arXiv.org, 2022-08

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2208.12497

Full text available

3
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis
Material Type:
Article
Add to My Research

Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis

arXiv.org, 2021-08

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.08742

Full text available

4
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models
Material Type:
Article
Add to My Research

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

arXiv.org, 2021-07

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.02718

Full text available

5
Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery
Material Type:
Article
Add to My Research

Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery

arXiv.org, 2022-02

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.07348

Full text available

6
SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel
Material Type:
Article
Add to My Research

SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel

arXiv.org, 2021-11

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.06002

Full text available

7
Designing a Location Trace Anonymization Contest
Material Type:
Article
Add to My Research

Designing a Location Trace Anonymization Contest

arXiv.org, 2022-09

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2107.10407

Full text available

8
MAGIC: A Method for Assessing Cyber Incidents Occurrence
Material Type:
Article
Add to My Research

MAGIC: A Method for Assessing Cyber Incidents Occurrence

arXiv.org, 2022-06

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2206.11586

Full text available

9
Man-at-the-End Software Protection as a Risk Analysis Process
Material Type:
Article
Add to My Research

Man-at-the-End Software Protection as a Risk Analysis Process

arXiv.org, 2022-03

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.07269

Full text available

10
Accountability and Insurance in IoT Supply Chain
Material Type:
Article
Add to My Research

Accountability and Insurance in IoT Supply Chain

arXiv.org, 2022-01

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2201.11855

Full text available

11
Quantitative Security Risk Modeling and Analysis with RisQFLan
Material Type:
Article
Add to My Research

Quantitative Security Risk Modeling and Analysis with RisQFLan

arXiv.org, 2021-01

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2101.08677

Full text available

12
A Unified View of IoT And CPS Security and Privacy
Material Type:
Article
Add to My Research

A Unified View of IoT And CPS Security and Privacy

arXiv.org, 2022-09

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2209.13793

Full text available

13
Multi-factor authentication for users of non-internet based applications of blockchain-based platforms
Material Type:
Article
Add to My Research

Multi-factor authentication for users of non-internet based applications of blockchain-based platforms

arXiv.org, 2020-10

2020. This work is published under http://creativecommons.org/publicdomain/zero/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/publicdomain/zero/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2010.07818

Full text available

14
Insider threat modeling: An adversarial risk analysis approach
Material Type:
Article
Add to My Research

Insider threat modeling: An adversarial risk analysis approach

arXiv.org, 2019-11

2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.09945

Full text available

15
Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis
Material Type:
Article
Add to My Research

Protecting from Malware Obfuscation Attacks through Adversarial Risk Analysis

arXiv.org, 2019-11

2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.03653

Full text available

16
PriFi: Low-Latency Anonymity for Organizational Networks
Material Type:
Article
Add to My Research

PriFi: Low-Latency Anonymity for Organizational Networks

arXiv.org, 2021-04

2021. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1710.10237

Full text available

17
Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED)
Material Type:
Article
Add to My Research

Risk Assessment of Cyber Attacks on Telemetry Enabled Cardiac Implantable Electronic Devices (CIED)

arXiv.org, 2019-04

2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1904.11908

Full text available

18
PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning
Material Type:
Article
Add to My Research

PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning

arXiv.org, 2020-10

2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2010.02529

Full text available

19
SwissCovid: a critical analysis of risk assessment by Swiss authorities
Material Type:
Article
Add to My Research

SwissCovid: a critical analysis of risk assessment by Swiss authorities

arXiv.org, 2020-06

2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2006.10719

Full text available

20
Protecting Classifiers From Attacks. A Bayesian Approach
Material Type:
Article
Add to My Research

Protecting Classifiers From Attacks. A Bayesian Approach

arXiv.org, 2020-04

2020. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2004.08705

Full text available

Results 1 - 20 of 40  for All Library Resources

Results 1 2 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Searching Remote Databases, Please Wait