macabre 发表于 2025-3-30 11:46:13

Carlos Arantes,João Sena Esteves user faces risks due to both, security as well as non-security related failures. We propose ., a simple and novel cyber-insurance model in which the user accepts a fraction . of loss recovery on himself and transfers rest of the loss recovery on the cyber-insurance agency. We mathematically show th

BYRE 发表于 2025-3-30 16:24:56

Bruno Amaro,Vinicius Silva,Filomena Soares,João Sena Esteveserent from classical intrusion detection as these sensors have no system- or user-defined policies that define their authorized or correct usage. Thus, to design effective defense mechanisms against such privacy threats, a clean slate approach that formalizes the problem of sensor access (to zero-pe

带子 发表于 2025-3-30 17:23:30

Przemysław Zawadzki,Paweł Buń,Filip Górski combined with constraint generation. Next, to improve scalability, we develop an approximate solution method that represents the attacker’s problem as an integer program, and then combines relaxation with duality to yield an upper bound on the defender’s objective that can be computed using mixed i

费解 发表于 2025-3-30 23:22:26

Karine Itao Palos,Gisela Belluzzo de Camposation is NP-hard even in the zero-sum case. We provide an MILP formulation for the general problem with constraints on cost and feasibility, along with a pseudo-polynomial time algorithm for the special . setting. Second, for risk-averse attackers, we present a solution based on Prospect theoretic m

敲诈 发表于 2025-3-31 03:59:04

http://reply.papertrans.cn/47/4670/466912/466912_55.png

增强 发表于 2025-3-31 07:36:53

http://reply.papertrans.cn/47/4670/466912/466912_56.png

nascent 发表于 2025-3-31 09:17:11

http://reply.papertrans.cn/47/4670/466912/466912_57.png

sulcus 发表于 2025-3-31 15:07:38

Daniel Honc,Milan Jičínskýreduce the target assets’ Long-Term Vulnerability (LTV) for proactive and persistent protection. We further characterize three tradeoffs, i.e., the probability of interference, the stealthiness level, and the roaming cost. To counter the curse of multiple attack paths, we propose an iterative algori

addict 发表于 2025-3-31 20:39:28

http://reply.papertrans.cn/47/4670/466912/466912_59.png

recede 发表于 2025-4-1 01:05:06

Petr Chalupa,František Gazdoš,Michal Jarmar,Jakub Novákhe decryption key after the payment of ransom, many victims are reluctant to pay the ransom and they accept the cost of data loss. Therefore, it is important to facilitate the negotiation between the attacker and victim to accelerate the release of data. To this end, first, we propose a mechanism to
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Innovation, Engineering and Entrepreneurship; José Machado,Filomena Soares,Germano Veiga Conference proceedings 2019 Springer Internationa