Search

Your search keyword '"Grossklags, Jens"' showing total 444 results

Search Constraints

Start Over You searched for: Author "Grossklags, Jens" Remove constraint Author: "Grossklags, Jens"
444 results on '"Grossklags, Jens"'

Search Results

1. PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics

2. Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study

3. Chapter 22 Social Credit System and Privacy

4. The Effectiveness of Security Interventions on GitHub

5. Data Forensics in Diffusion Models: A Systematic Analysis of Membership Privacy

6. The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox

7. Bug Hunters' Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

8. Data Portability

10. An Empirical Study of Android Security Bulletins in Different Vendors

12. Analyzing Control Flow Integrity with LLVM-CFI

13. Hey Google, What Exactly Do Your Security Patches Tell Us? A Large-Scale Empirical Study on Android Patched Vulnerabilities

14. Economic Analyses of Security Investments on Cryptocurrency Exchanges

15. How Reliable is the Crowdsourced Knowledge of Security Implementation?

17. Attitudes Toward Facial Analysis AI: A Cross-National Study Comparing Argentina, Kenya, Japan, and the USA

19. Regulating Access to System Sensors in Cooperating Programs

20. IntRepair: Informed Repairing of Integer Overflows

21. An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

22. Practical Integer Overflow Prevention

23. Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution

24. On the Economics of Ransomware

25. When to Invest in Security? Empirical Evidence and a Game-Theoretic Approach for Time-Based Security

27. Responding to KRACK: Wi-Fi Security Awareness in Private Households

28. Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations

29. Challenges in IT Security Processes and Solution Approaches with Process Mining

30. Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs

31. Aware: Controlling App Access to I/O Devices on Mobile Platforms

33. Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs

35. A Game-Theoretic Study on Non-Monetary Incentives in Data Analytics Projects with Privacy Implications

36. Time-Dependent Strategies in Games of Timing

39. Understanding the Legitimacy of Digital Socio-Technical Classification Systems

40. VaultIME: Regaining User Control for Password Managers Through Auto-Correction

41. The Rules of Engagement for Bug Bounty Programs

42. An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

43. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM

44. A Democracy Called Facebook? Participation as a Privacy Strategy on Social Media

45. Cyber-Insurance as a Signaling Game: Self-reporting and External Security Audits

46. CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

47. Americans, Marketers, and the Internet: 1999-2012

Catalog

Books, media, physical & digital resources