DALLY 发表于 2025-3-23 10:15:14

http://reply.papertrans.cn/31/3021/302009/302009_11.png

Retrieval 发表于 2025-3-23 16:25:39

Real Name Verification Law on the Internet: A Poison or Cure for Privacy?,that is subject to the law, the results suggest that Real Name Verification Law has a dampening effect on overall participation in the short-term, but the law did not affect the participation in the long term. Also, identification of postings had significant effects on reducing uninhibited behaviors

乳汁 发表于 2025-3-23 21:40:40

https://doi.org/10.1007/978-3-658-30965-7n is worth. The strategy that appears simple in isolation leads to bankruptcy in expectation. Many attacks cannot be made profitable, even when many profitable targets exist. We give several examples of insecure practices which should be exploited by a weakest-link attacker but are extremely difficult to turn into profitable attacks.

irreparable 发表于 2025-3-24 00:34:39

Brandschutzkonzept und Brandschutznachweis,ansit traffic appear more effective than ones that block outgoing traffic. The model allows us to quantify and compare positive externalities created by different countermeasures. Our results give an initial indication of the types and levels of intervention that are most cost-effective at large scale.

一再困扰 发表于 2025-3-24 02:57:33

http://reply.papertrans.cn/31/3021/302009/302009_15.png

柔声地说 发表于 2025-3-24 07:10:14

http://reply.papertrans.cn/31/3021/302009/302009_16.png

CREST 发表于 2025-3-24 14:45:28

The Impact of Immediate Disclosure on Attack Diffusion and Volume,f vulnerabilities reduces delay in the attack diffusion process and slightly increases penetration of attacks in the population of target systems but slightly decreases the overall the volume of attacks.

Ataxia 发表于 2025-3-24 15:36:53

Resilience of the Internet Interconnection Ecosystem,e formal outcome of the study was the publication by ENISA in early 2011 of a detailed technical report, “.. This paper presents a much abridged version of the ENISA report. In it, we present a summary of the problems that the Internet faces in keeping its interconnection system resilient, along with the recommendations proposed to policy makers.

用树皮 发表于 2025-3-24 20:45:00

combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Curren

FECT 发表于 2025-3-25 02:40:09

Introduction: Thinking About Brandsf vulnerabilities reduces delay in the attack diffusion process and slightly increases penetration of attacks in the population of target systems but slightly decreases the overall the volume of attacks.
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Economics of Information Security and Privacy III; Bruce Schneier Conference proceedings 2013 Springer Science+Business Media New York 201