標(biāo)題: Titlebook: Socio-Technical Aspects in Security and Trust; 9th International Wo Thomas Gro?,Theo Tryfonas Conference proceedings 2021 Springer Nature S [打印本頁] 作者: 非決定性 時間: 2025-3-21 19:59
書目名稱Socio-Technical Aspects in Security and Trust影響因子(影響力)
書目名稱Socio-Technical Aspects in Security and Trust影響因子(影響力)學(xué)科排名
書目名稱Socio-Technical Aspects in Security and Trust網(wǎng)絡(luò)公開度
書目名稱Socio-Technical Aspects in Security and Trust網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Socio-Technical Aspects in Security and Trust被引頻次
書目名稱Socio-Technical Aspects in Security and Trust被引頻次學(xué)科排名
書目名稱Socio-Technical Aspects in Security and Trust年度引用
書目名稱Socio-Technical Aspects in Security and Trust年度引用學(xué)科排名
書目名稱Socio-Technical Aspects in Security and Trust讀者反饋
書目名稱Socio-Technical Aspects in Security and Trust讀者反饋學(xué)科排名
作者: DUST 時間: 2025-3-21 23:22
odels beginning with the basic to the more advanced and illu.Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building作者: 幾何學(xué)家 時間: 2025-3-22 02:51
Thomas Gro?odels beginning with the basic to the more advanced and illu.Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building作者: JADED 時間: 2025-3-22 08:05
Mohammad Tahaei,Adam Jenkins,Kami Vaniea,Maria Woltersthree ways. First, the discrete event system is defined as a collection of event sets that depend on strings. Whenthe system generates a string, the next event that occurs should be in the corresponding event set. Second, the rewards are for choosing control inputs at strings. Finally, the control p作者: 松軟 時間: 2025-3-22 11:10
Dirk van der Linden,Irit Hadar,Matthew Edwards,Awais Rashidthree ways. First, the discrete event system is defined as a collection of event sets that depend on strings. Whenthe system generates a string, the next event that occurs should be in the corresponding event set. Second, the rewards are for choosing control inputs at strings. Finally, the control p作者: LASH 時間: 2025-3-22 16:10
Albes? Demjaha,Simon Parkin,David Pymhorizon models. For a finite horizon model, the problem with an expected total reward optimization criterion is considered, which can be efficiently solved by using the backward dynamic programming technique. For infinite horizon models, two basic problems are studied: the problem with an expected t作者: 做作 時間: 2025-3-22 17:49 作者: Charitable 時間: 2025-3-22 22:07 作者: CLAN 時間: 2025-3-23 01:49
then be carried out via a preference list, an ordered set of runway combinations such that the higher on the list a runway combination, the better this combination is for reducing noise load. The highest safe runway combination in the list will actually be used. The optimal preference list selection作者: CROAK 時間: 2025-3-23 09:24 作者: 臭名昭著 時間: 2025-3-23 13:15 作者: 痛苦一生 時間: 2025-3-23 17:39
A Security Analysis of the Danish Deposit Return System to the security threats due to people interacting with the technology behind DRS. The findings of our investigation enable novel considerations of the ceremony weaknesses and make it possible to delineate potential mitigations.作者: Dna262 時間: 2025-3-23 21:35
Moving to Client-Side Hashing for Online Authenticationver, where it is hashed and stored. We investigate the advantages and drawbacks of the alternative of hashing client-side, and show that it is present today exclusively on Chinese websites. We also look at ways to implement it on a large scale in the near future.作者: BAIL 時間: 2025-3-23 22:21 作者: alcoholism 時間: 2025-3-24 06:24 作者: 善辯 時間: 2025-3-24 07:42
Fidelity of Statistical Reporting in 10 Years of Cyber Security User Studiesy, thereby, enable practitioners and scientists alike to judge on the validity and reliability of the research undertaken..To ascertain this capacity, we investigated the reporting fidelity of security user studies..Based on a systematic literature review of 114 user studies in cyber security from s作者: lattice 時間: 2025-3-24 14:22
“I Don’t Know Too Much About It”: On the Security Mindsets of Computer Science Studentshen these views are constructed. This paper investigates the security and privacy (S&P) perceptions, experiences, and practices of current Computer Science students at the graduate and undergraduate level using semi-structured interviews. We find that the attitudes of students already match many of 作者: Negligible 時間: 2025-3-24 14:55
Data, Data, Everywhere: Quantifying Software Developers’ Privacy Attitudess’ privacy fairly. We present the results of a study adapting an existing user-focused privacy concern scale to a software development context and running it with a sample of 123 software developers, in order to validate it and develop a model for measuring the extent to which a software developer i作者: CLAMP 時間: 2025-3-24 22:21 作者: Homocystinuria 時間: 2025-3-25 01:11 作者: 下船 時間: 2025-3-25 03:57 作者: 有效 時間: 2025-3-25 10:49
A Security Analysis of the Danish Deposit Return Systemit typically sees a set of human parties (e.g. customers, cashiers) and technical parties (e.g., RVMs, databases, scanners) to collaborate in order to enable effective recycling. In this paper, we advance a formal treatment of the Danish Deposit Return System (DRS). We investigate the security of th作者: micronutrients 時間: 2025-3-25 13:30
Moving to Client-Side Hashing for Online Authenticationlemented in practice. The common practice today, inherited from previous but obsolete constraints, is to transmit the password in cleartext to the server, where it is hashed and stored. We investigate the advantages and drawbacks of the alternative of hashing client-side, and show that it is present作者: Hdl348 時間: 2025-3-25 17:03 作者: acolyte 時間: 2025-3-26 00:02 作者: ureter 時間: 2025-3-26 02:04
Investigating the Effect of Incidental Affect States on Privacy Behavioral Intentionfect (fear and happy) on privacy behavioral intention. We recruited 330 participants for a within-subjects experiment in three random-controlled user studies. The participants were exposed to three conditions ., ., . with standardised stimuli videos for incidental affect induction. Fear and happy st作者: 豐富 時間: 2025-3-26 05:46 作者: transplantation 時間: 2025-3-26 08:34
What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study empirical studies are generally based on convenience sampled public data sets. Also, there is a need for more in-depth, qualitative studies in order to understand what drives bug hunters and product owners towards finding constructive ways of working together.作者: 一窩小鳥 時間: 2025-3-26 14:38
Association Attacks in IEEE 802.11: Exploiting WiFi Usability Featuresar, we analyze various strategies that may be implemented by an adversary in order to increase the success rate of association attacks, and we show that even though network managers have hampered the effectiveness of some known attacks (e.g. KARMA), other techniques (e.g. Known Beacons) are still an active threat.作者: Ceremony 時間: 2025-3-26 20:38 作者: 聰明 時間: 2025-3-27 00:41 作者: ATP861 時間: 2025-3-27 02:46
Socio-Technical Aspects in Security and Trust978-3-030-55958-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: fabricate 時間: 2025-3-27 07:42 作者: Commodious 時間: 2025-3-27 11:40
https://doi.org/10.1007/978-3-030-55958-8access control; artificial intelligence; authentication; computer hardware; computer networks; computer s作者: 尾隨 時間: 2025-3-27 16:05
Which Properties Has an Icon? A Critical Discussion on Data Protection Iconographyr,” several icon sets have been developed. In this paper, we firstly critically review some of those proposals. We then examine the properties that icons and icon sets should arguably fulfill according to Art.12’s transparency provisions. Lastly, we discuss metrics and evaluation procedures to measure compliance with the Article.作者: initiate 時間: 2025-3-27 18:48 作者: 完成 時間: 2025-3-27 22:20
Gianpiero Costantino,Fabio Martinelli,Ilaria Matteucci,Paolo Santi作者: prediabetes 時間: 2025-3-28 05:09
Julissa Milligan,Sarah Scheffler,Andrew Sellars,Trishita Tiwari,Ari Trachtenberg,Mayank Varia作者: Debrief 時間: 2025-3-28 07:08 作者: Irrepressible 時間: 2025-3-28 12:11
Data, Data, Everywhere: Quantifying Software Developers’ Privacy Attitudes further discuss mismatches between developers’ attitudes and their self-perceived extent of properly handling their users’ privacy, and the importance of understanding developers’ attitudes towards data monetization.作者: Creatinine-Test 時間: 2025-3-28 16:55
You’ve Left Me No Choices: Security Economics to Inform Behaviour Intervention Support in Organizaties to security behaviour provisioning in organizations mirror rational-agent economics, even where behavioural economics is embodied in the promotion of individual security behaviours. We develop and present a framework to accommodate ., within an ongoing programme of behaviours which must be provis作者: Strength 時間: 2025-3-28 19:27
A Privacy-Preserving Infrastructure for Driver’s Reputation Aware Automotive Servicesrmation generated from vehicles sensors and the environment, and to compose the collected information into driver reputation profiles. In turn, these profiles are exchanged in a privacy preserving way within the infrastructure to realize reputation-aware automotive services, a sample of which are de作者: 抱狗不敢前 時間: 2025-3-28 23:25
Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies disclosures are sufficient to enable website visitors to block the tracking methods. We compare these disclosures to the disclosure of direct fingerprinting methods on the same websites..Our case study analyzes one indirect fingerprinting technique, .. We use an existing automated detector of this 作者: confide 時間: 2025-3-29 05:43 作者: triptans 時間: 2025-3-29 10:29 作者: COLON 時間: 2025-3-29 15:26
pplications outlines recent developments of Markov chain models for modeling queueing sequences, Internet, re-manufacturing systems, reverse logistics, inventory systems, bio-informatics, DNA sequences, genetic networks, data mining, and many other practical systems..978-1-4419-3986-9978-0-387-29337-0Series ISSN 0884-8289 Series E-ISSN 2214-7934 作者: arthrodesis 時間: 2025-3-29 18:09
Thomas Gro?pplications outlines recent developments of Markov chain models for modeling queueing sequences, Internet, re-manufacturing systems, reverse logistics, inventory systems, bio-informatics, DNA sequences, genetic networks, data mining, and many other practical systems..978-1-4419-3986-9978-0-387-29337-0Series ISSN 0884-8289 Series E-ISSN 2214-7934 作者: Popcorn 時間: 2025-3-29 22:04
Mohammad Tahaei,Adam Jenkins,Kami Vaniea,Maria Wolters control problem of DESs with the control pattern being dependent on strings. We study the problem in both event feedback control and state feedback control by generalizing concepts of invariant and closed languages/predicates from the supervisory control literature. Finally, we apply our model and 作者: cornucopia 時間: 2025-3-30 00:45 作者: Nomogram 時間: 2025-3-30 04:20 作者: 沉著 時間: 2025-3-30 10:15
is on formulating and studying the infinite horizon decision problems in terms of stationary strategies. We show that infinite horizon Markov decision problems with average and discounted optimization criteria can be formulated in terms of stationary strategies as classical mathematical programming