轻快走过 发表于 2025-3-27 00:09:56
Sex, Lies and Cyber-Crime Surveys,survey. First, losses are extremely concentrated, so that representative sampling of the population does not give representative sampling of the losses. Second, losses are based on unverified self-reported numbers. Not only is it possible for a single outlier to distort the result, we find evidenceLegion 发表于 2025-3-27 01:42:21
http://reply.papertrans.cn/31/3021/302009/302009_32.png袋鼠 发表于 2025-3-27 07:08:43
The Inconvenient Truth About Web Certificates,ubious. HTTPS may fail to provide security for multiple reasons, mostly due to certificate-based authentication failures. Given the importance of HTTPS, we investigate the current scale and practices of HTTPS and certificate-based deployment. We provide a large-scale empirical analysis that considerSTART 发表于 2025-3-27 11:08:00
http://reply.papertrans.cn/31/3021/302009/302009_34.pngdainty 发表于 2025-3-27 14:40:37
Modeling Internet-Scale Policies for Cleaning up Malware,nce of malware. However, assessing the suitability of countermeasures at this scale is hard. In this paper, we use an agent-based model, called ASIM, to investigate the impact of policy interventions at the Autonomous System level of the Internet. For instance, we find that coordinated interventionMawkish 发表于 2025-3-27 18:29:32
Fixed Costs, Investment Rigidities, and Risk Aversion in Information Security: A Utility-theoretic ve the limiting condition under which, given a potential or realized risk, a decision to invest, delay, or abandon can be justified. Our primary focus is on the decision to defer costly deterministic investments, such as the removal of a service or implementation of a security patch, when the costs弄皱 发表于 2025-3-28 01:59:39
http://reply.papertrans.cn/31/3021/302009/302009_37.png厚颜无耻 发表于 2025-3-28 03:36:43
http://reply.papertrans.cn/31/3021/302009/302009_38.png固执点好 发表于 2025-3-28 08:55:18
http://reply.papertrans.cn/31/3021/302009/302009_39.pngHot-Flash 发表于 2025-3-28 13:16:45
The Privacy Landscape: Product Differentiation on Data Collection,ces, a sizeable proportion consider differences in data collection and processing amongst alternative suppliers when deciding where to buy. Meeting their heterogeneous privacy preferences would require varied privacy regimes between different suppliers. Based on an empirical evaluation of 140 web si