skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index
Results 1 2 3 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
Material Type:
Article
Add to My Research

A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS

arXiv.org, 2022-12

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2212.10830

Full text available

2
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models
Material Type:
Article
Add to My Research

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

arXiv.org, 2021-07

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2103.02718

Full text available

3
A Review of Techniques to Mitigate Sybil Attacks
Material Type:
Article
Add to My Research

A Review of Techniques to Mitigate Sybil Attacks

arXiv.org, 2012-07

2012. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1207.2617

Full text available

4
Accountability and Insurance in IoT Supply Chain
Material Type:
Article
Add to My Research

Accountability and Insurance in IoT Supply Chain

arXiv.org, 2022-01

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2201.11855

Full text available

5
Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments
Material Type:
Article
Add to My Research

Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments

arXiv.org, 2013-05

2013. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1305.7488

Full text available

6
Applying mathematical models in cloud computing: A survey
Material Type:
Article
Add to My Research

Applying mathematical models in cloud computing: A survey

arXiv.org, 2014-03

2014. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1403.3649

Full text available

7
Bitcoin and Blockchain: Security and Privacy
Material Type:
Article
Add to My Research

Bitcoin and Blockchain: Security and Privacy

arXiv.org, 2019-04

2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1904.11435

Full text available

8
CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises
Material Type:
Article
Add to My Research

CEntRE: A paragraph-level Chinese dataset for Relation Extraction among Enterprises

arXiv.org, 2022-10

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2210.10581

Full text available

9
Data Protection Impact Assessment for the Corona App
Material Type:
Article
Add to My Research

Data Protection Impact Assessment for the Corona App

arXiv.org, 2021-01

2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2101.07292

Full text available

10
Decentralized Trust Management: Risk Analysis and Trust Aggregation
Material Type:
Article
Add to My Research

Decentralized Trust Management: Risk Analysis and Trust Aggregation

arXiv.org, 2019-09

2019. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1909.11355

Full text available

11
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration
Material Type:
Article
Add to My Research

DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration

arXiv.org, 2018-03

2018. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1803.09257

Full text available

12
Designing a Location Trace Anonymization Contest
Material Type:
Article
Add to My Research

Designing a Location Trace Anonymization Contest

arXiv.org, 2022-09

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2107.10407

Full text available

13
Efficient Attack Graph Analysis through Approximate Inference
Material Type:
Article
Add to My Research

Efficient Attack Graph Analysis through Approximate Inference

arXiv.org, 2016-06

2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1606.07025

Full text available

14
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs
Material Type:
Article
Add to My Research

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

arXiv.org, 2016-11

2016. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1510.02427

Full text available

15
How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems
Material Type:
Article
Add to My Research

How to Generate Security Cameras: Towards Defence Generation for Socio-Technical Systems

arXiv.org, 2015-09

2015. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1509.00643

Full text available

16
Insider threat modeling: An adversarial risk analysis approach
Material Type:
Article
Add to My Research

Insider threat modeling: An adversarial risk analysis approach

arXiv.org, 2019-11

2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1911.09945

Full text available

17
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications
Material Type:
Article
Add to My Research

Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

arXiv.org, 2017-07

2017. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.1707.02140

Full text available

18
Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery
Material Type:
Article
Add to My Research

Invariant Risk Minimisation for Cross-Organism Inference: Substituting Mouse Data for Human Data in Human Risk Factor Discovery

arXiv.org, 2022-02

2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://creativecommons.org/licenses/by/4.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2111.07348

Full text available

19
MAGIC: A Method for Assessing Cyber Incidents Occurrence
Material Type:
Article
Add to My Research

MAGIC: A Method for Assessing Cyber Incidents Occurrence

arXiv.org, 2022-06

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2206.11586

Full text available

20
Man-at-the-End Software Protection as a Risk Analysis Process
Material Type:
Article
Add to My Research

Man-at-the-End Software Protection as a Risk Analysis Process

arXiv.org, 2022-03

2022. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;http://arxiv.org/licenses/nonexclusive-distrib/1.0 ;EISSN: 2331-8422 ;DOI: 10.48550/arxiv.2011.07269

Full text available

Results 1 2 3 next page

Searching Remote Databases, Please Wait