Search

Your search keyword '"Jens Grossklags"' showing total 45 results

Search Constraints

Start Over You searched for: Author "Jens Grossklags" Remove constraint Author: "Jens Grossklags" Topic computer Remove constraint Topic: computer
45 results on '"Jens Grossklags"'

Search Results

1. Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder

2. Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education

3. Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20

4. Method Confusion Attack on Bluetooth Pairing

5. ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings

6. An Empirical Study of Android Security Bulletins in Different Vendors

7. An Options Approach to Cybersecurity Investment

8. Challenges in IT Security Processes and Solution Approaches with Process Mining

11. Analyzing Control Flow Integrity with LLVM-CFI

12. Take It or Leave It

13. $$\tau $$ CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

14. An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

15. Secure Team Composition to Thwart Insider Threats and Cyber-Espionage

16. Financial Cryptography and Data Security

17. On the Economics of Ransomware

18. End user cybercrime reporting: what we know and what we can do to improve it

19. FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage

20. Adaptive Steganography and Steganalysis with Fixed-Size Embedding

21. A Short Paper on the Incentives to Share Private Information for Population Estimates

22. Should Cyber-Insurance Providers Invest in Software Security?

23. When Bitcoin Mining Pools Run Dry

24. How Task Familiarity and Cognitive Predispositions Impact Behavior in a Security Game of Timing

25. The Complexity of Estimating Systematic Risk in Networks

26. How many down?

27. Bitspotting: Detecting Optimal Adaptive Steganography

28. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools

29. Managing the Weakest Link

30. Mitigating Covert Compromises

31. Mitigation of Targeted and Non-targeted Covert Attacks as a Timing Game

32. Trading Agent Kills Market Information

33. It’s All about the Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice

34. Nash Equilibria for Weakest Target Security Games with Heterogeneous Agents

35. The security cost of cheap user interaction

36. Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information

37. Nudge: Intermediaries’ Role in Interdependent Network Security

38. Uncertainty in the weakest-link security game

39. Blue versus Red: Towards a Model of Distributed Security Attacks

40. Economics-Informed Design of CDNs

41. Security and insurance management in networks with heterogeneous agents

42. Secure or insure?

43. Noticing notice

44. Stopping spyware at the gate

45. How loss profiles reveal behavioural biases in interdependent security decisions

Catalog

Books, media, physical & digital resources