可用 发表于 2025-3-28 18:14:10
http://reply.papertrans.cn/27/2644/264327/264327_41.png偶像 发表于 2025-3-28 19:10:30
http://reply.papertrans.cn/27/2644/264327/264327_42.pngnegotiable 发表于 2025-3-28 23:16:30
http://reply.papertrans.cn/27/2644/264327/264327_43.png过剩 发表于 2025-3-29 05:16:57
Optimal Information Security Investment with Penetration Testingurity practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete time, finite horizon, player-versus-nature, weakest-link security game. We prove that once senmesh 发表于 2025-3-29 07:33:35
http://reply.papertrans.cn/27/2644/264327/264327_45.pngIngratiate 发表于 2025-3-29 14:16:22
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymityhe problem as a repeated non-cooperative game between the defender and the adversary (i.e., controller of the compromised Tor nodes to carry out entry-exit linking attacks). Given the current path selection algorithm of Tor, we derive an optimal attack strategy for the adversary according to its uti机械 发表于 2025-3-29 16:54:13
When Do Firms Invest in Privacy-Preserving Technologies?privacy that firms are able to provide, for example, the use of certain banking services, health care information technology ...etc. Firms thus face crucial assessment of investment on privacy-preserving technologies. Two important factors affect firms’ valuation: (1) a customer’s valuation of higain631 发表于 2025-3-29 23:12:15
Adversarial Control in a Delay Tolerant Networksource’s objective is to choose transmission probabilities so as to maximize the probability of successful delivery of some content to the destination within a deadline. These transmissions are subject to interference from a jammer who is a second, adversarial type controller, We solve three variant虚弱的神经 发表于 2025-3-30 02:48:49
Security Interdependencies for Networked Control Systems with Identical Agentsced risks. Each plant is modeled by a discrete-time stochastic linear system, which is sensed and controlled over a communication network. We model security decisions of the individual systems (also called players) as a game. We consider a two-stage game, in which first, the players choose whether tRODE 发表于 2025-3-30 04:54:53
http://reply.papertrans.cn/27/2644/264327/264327_50.png