Meander 发表于 2025-3-25 04:09:08
http://reply.papertrans.cn/25/2419/241864/241864_21.png碎石 发表于 2025-3-25 11:07:42
http://reply.papertrans.cn/25/2419/241864/241864_22.png不再流行 发表于 2025-3-25 13:29:39
http://reply.papertrans.cn/25/2419/241864/241864_23.png安慰 发表于 2025-3-25 17:34:22
Joan P. Baker,Sigurd W. Christenseners pursue their operation. Further, we use prospect theory to model risk aversion and overconfidence among attackers. We illustrate the applicability of this model, and we discuss how defenders can use our insights to raise the transaction cost of exfiltration.impale 发表于 2025-3-25 20:43:48
Next Generation ISACs: Simulating Crowdsourced Intelligence for Faster Incident Responseing. We find that single-community platforms such as ThreatFox let agents share low-value IoC fast, whereas closed-user communities such as MISP create conditions that enable users to share high-value IoC. We discuss the extent to which a combination of both designs may prove to be effective.大猩猩 发表于 2025-3-26 03:14:21
Individual Career Versus Corporate Security: A Simulation of CSO Investment Choices CSO reputation and inter-firm migration as well as cyberdefense effectiveness. We argue that a positive (negative) dynamic should exist between high (low) CSO reputation and effective corporate protection, and we simulate this hypothesized relationship by a Monte Carlo process which uses data from real cybersecurity breaches.CHASM 发表于 2025-3-26 05:53:08
http://reply.papertrans.cn/25/2419/241864/241864_27.pngArb853 发表于 2025-3-26 10:40:36
http://reply.papertrans.cn/25/2419/241864/241864_28.png热心助人 发表于 2025-3-26 14:15:38
http://reply.papertrans.cn/25/2419/241864/241864_29.pngsparse 发表于 2025-3-26 16:56:33
https://doi.org/10.1007/978-1-4615-8353-0ow firms can use this method with open source data from public repositories to generate unbiased insights about future technology developments, and to assess the maturity, security and likely future development of particular technology domains. The method is demonstrated by systematic text mining of