macabre 发表于 2025-3-30 11:46:13
Carlos Arantes,João Sena Esteves user faces risks due to both, security as well as non-security related failures. We propose ., a simple and novel cyber-insurance model in which the user accepts a fraction . of loss recovery on himself and transfers rest of the loss recovery on the cyber-insurance agency. We mathematically show thBYRE 发表于 2025-3-30 16:24:56
Bruno Amaro,Vinicius Silva,Filomena Soares,João Sena Esteveserent from classical intrusion detection as these sensors have no system- or user-defined policies that define their authorized or correct usage. Thus, to design effective defense mechanisms against such privacy threats, a clean slate approach that formalizes the problem of sensor access (to zero-pe带子 发表于 2025-3-30 17:23:30
Przemysław Zawadzki,Paweł Buń,Filip Górski combined with constraint generation. Next, to improve scalability, we develop an approximate solution method that represents the attacker’s problem as an integer program, and then combines relaxation with duality to yield an upper bound on the defender’s objective that can be computed using mixed i费解 发表于 2025-3-30 23:22:26
Karine Itao Palos,Gisela Belluzzo de Camposation is NP-hard even in the zero-sum case. We provide an MILP formulation for the general problem with constraints on cost and feasibility, along with a pseudo-polynomial time algorithm for the special . setting. Second, for risk-averse attackers, we present a solution based on Prospect theoretic m敲诈 发表于 2025-3-31 03:59:04
http://reply.papertrans.cn/47/4670/466912/466912_55.png增强 发表于 2025-3-31 07:36:53
http://reply.papertrans.cn/47/4670/466912/466912_56.pngnascent 发表于 2025-3-31 09:17:11
http://reply.papertrans.cn/47/4670/466912/466912_57.pngsulcus 发表于 2025-3-31 15:07:38
Daniel Honc,Milan Jičínskýreduce the target assets’ Long-Term Vulnerability (LTV) for proactive and persistent protection. We further characterize three tradeoffs, i.e., the probability of interference, the stealthiness level, and the roaming cost. To counter the curse of multiple attack paths, we propose an iterative algoriaddict 发表于 2025-3-31 20:39:28
http://reply.papertrans.cn/47/4670/466912/466912_59.pngrecede 发表于 2025-4-1 01:05:06
Petr Chalupa,František Gazdoš,Michal Jarmar,Jakub Novákhe decryption key after the payment of ransom, many victims are reluctant to pay the ransom and they accept the cost of data loss. Therefore, it is important to facilitate the negotiation between the attacker and victim to accelerate the release of data. To this end, first, we propose a mechanism to