Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
![]() |
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORASarXiv.org, 2022-122022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2212.10830Full text available |
2 |
Material Type: Article
|
![]() |
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning ModelsarXiv.org, 2021-072021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.02718Full text available |
3 |
Material Type: Article
|
![]() |
A Review of Techniques to Mitigate Sybil AttacksarXiv.org, 2012-072012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1207.2617Full text available |
4 |
Material Type: Article
|
![]() |
Accountability and Insurance in IoT Supply ChainarXiv.org, 2022-012022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2201.11855Full text available |
5 |
Material Type: Article
|
![]() |
Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing EnvironmentsarXiv.org, 2013-052013. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1305.7488Full text available |
6 |
Material Type: Article
|
![]() |
Applying mathematical models in cloud computing: A surveyarXiv.org, 2014-032014. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1403.3649Full text available |
7 |
Material Type: Article
|
![]() |
Bitcoin and Blockchain: Security and PrivacyarXiv.org, 2019-042019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1904.11435Full text available |
8 |
Material Type: Article
|
![]() |
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among EnterprisesarXiv.org, 2022-102022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2210.10581Full text available |
9 |
Material Type: Article
|
![]() |
Data Protection Impact Assessment for the Corona ApparXiv.org, 2021-012021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2101.07292Full text available |
10 |
Material Type: Article
|
![]() |
Decentralized Trust Management: Risk Analysis and Trust AggregationarXiv.org, 2019-092019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1909.11355Full text available |
11 |
Material Type: Article
|
![]() |
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight DeclarationarXiv.org, 2018-032018. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1803.09257Full text available |
12 |
Material Type: Article
|
![]() |
Designing a Location Trace Anonymization ContestarXiv.org, 2022-092022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2107.10407Full text available |
13 |
Material Type: Article
|
![]() |
Efficient Attack Graph Analysis through Approximate InferencearXiv.org, 2016-062016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1606.07025Full text available |
14 |
Material Type: Article
|
![]() |
Exact Inference Techniques for the Analysis of Bayesian Attack GraphsarXiv.org, 2016-112016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1510.02427Full text available |
15 |
Material Type: Article
|
![]() |
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical SystemsarXiv.org, 2015-092015. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1509.00643Full text available |
16 |
Material Type: Article
|
![]() |
Insider threat modeling: An adversarial risk analysis approacharXiv.org, 2019-112019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.09945Full text available |
17 |
Material Type: Article
|
![]() |
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and ApplicationsarXiv.org, 2017-072017. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1707.02140Full text available |
18 |
Material Type: Article
|
![]() |
Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor DiscoveryarXiv.org, 2022-022022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.07348Full text available |
19 |
Material Type: Article
|
![]() |
MAGIC: A Method for Assessing Cyber Incidents OccurrencearXiv.org, 2022-062022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2206.11586Full text available |
20 |
Material Type: Article
|
![]() |
Man-at-the-End Software Protection as a Risk Analysis ProcessarXiv.org, 2022-032022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.07269Full text available |