Showing 311 - 320 of 6,512
Persistent link: https://www.econbiz.de/10015211229
The focus of this review is the long and broad history of attacker-defender games as a foundation for the narrower and shorter history of cyber security. The purpose is to illustrate the role of game theory in cyber security and which areas have received attention and to indicate future research...
Persistent link: https://www.econbiz.de/10015271344
Persistent link: https://www.econbiz.de/10014336745
Persistent link: https://www.econbiz.de/10015152825
Persistent link: https://www.econbiz.de/10015152859
Persistent link: https://www.econbiz.de/10015135201
Chapter 1 Basic concepts of cybersecurity -- Chapter 2 Attack vectors and malware -- Chapter 3 System security -- Chapter 4 Cryptography -- Chapter 5 Key management and PKI -- Chapter 6 Network security -- Chapter 7 Wireless Security -- Chapter 8 User authentication -- Chapter 9 IAM – Identity...
Persistent link: https://www.econbiz.de/10015135607
We examine how cybercrime impacts victims' risk-taking and returns. The results from our difference-in-differences analysis of a sample of victim and matched non-victim investors on the Ethereum blockchain are in line with prospect theory and suggests that victims increase their long-term total...
Persistent link: https://www.econbiz.de/10015272749
This report focuses on analysing the current situation concerning cybersecurity challenge competitions in Europe. The experience gathered will be the basis to develop a pan-European competition on cybersecurity. The European Cyber Security Challenge Competition 2015 is set to be the result of a...
Persistent link: https://www.econbiz.de/10015274379
Cybersecurity tools and services aim to protect networks, data and devices from tampering, unauthorised access or criminal uses. With so much data now stored on the internet, cybersecurity becomes an essential tool for people, governments, and corporations.
Persistent link: https://www.econbiz.de/10015275150