325 results on '"Jens Grossklags"'
Search Results
52. An Empirical Study of Android Security Bulletins in Different Vendors.
53. Challenges in IT Security Processes and Solution Approaches with Process Mining.
54. Analysis of Darknet Market Activity as a Country-Specific, Socio-Economic and Technological Phenomenon.
55. ρFEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings.
56. Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations.
57. Security onboarding: an interview study on security training for temporary employees.
58. Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions.
59. Integrating Cybersecurity and Artificial Intelligence Research in Engineering and Computer Science Education.
60. The Right to Data Portability: conception, status quo, and future directions.
61. Data Portability between Online Services: An Empirical Analysis on the Effectiveness of GDPR Art. 20.
62. IntRepair: Informed Repairing of Integer Overflows.
63. The Transparency of the Chinese Social Credit System from the Perspective of German Organizations.
64. How reliable is the crowdsourced knowledge of security implementation?
65. Clear Sanctions, Vague Rewards: How China's Social Credit System Currently Defines 'Good' and 'Bad' Behavior.
66. Report Now. Report Effectively. Conceptualizing the Industry Practice for Cybercrime Reporting.
67. EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
68. Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards Stronger Cryptography.
69. Setting the Stage: Towards Principles for Reasonable Image Inferences.
70. Analyzing control flow integrity with LLVM-CFI.
71. The Differences in Data Sensitivity Perceptions among Private and Workplace Health Apps: A Delphi Study.
72. Time-Dependent Strategies in Games of Timing.
73. Assessing the current state of information security policies in academic organizations.
74. An Analysis of the Current State of the Consumer Credit Reporting System in China.
75. The Rules of Engagement for Bug Bounty Programs.
76. An Economic Study of the Effect of Android Platform Fragmentation on Security Updates.
77. Economic Analyses of Security Investments on Cryptocurrency Exchanges.
78. Sharing is Caring: Collaborative Analysis and Real-Time Enquiry for Security Analytics.
79. Take It or Leave It: A Survey Study on Operating System Upgrade Practices.
80. τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
81. A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media.
82. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM.
83. Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits.
84. Exponential discounting in security games of timing.
85. On Sharing Intentions, and Personal and Interdependent Privacy Considerations for Genetic Data: A Vignette Study.
86. 'Hello. This is the IRS calling.': A case study on scams, extortion, impersonation, and phone spoofing.
87. Valuating Friends' Privacy: Does Anonymity of Sharing Personal Data Matter?
88. AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
89. I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication.
90. VaultIME: Regaining User Control for Password Managers Through Auto-Correction.
91. On the Economics of Ransomware.
92. Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory.
93. The Acceptable State: an Analysis of the current State of Acceptable Use Policies in Academic Institutions.
94. On the Assessment of Systematic Risk in Networked Systems.
95. Should users participate in governing social media? Philosophical and technical considerations of democratic social media.
96. When cybercrimes strike undergraduates.
97. Sharing Is Caring, or Callous?
98. Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms.
99. FlipLeakage: A Game-Theoretic Approach to Protect Against Stealthy Attackers in the Presence of Information Leakage.
100. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.