Showing 121 - 130 of 76,492
Persistent link: https://www.econbiz.de/10012155657
Persistent link: https://www.econbiz.de/10011758924
Persistent link: https://www.econbiz.de/10011762361
Persistent link: https://www.econbiz.de/10012424579
In a two-period game, Player 1 produces zero-day exploits for immediate deployment or stockpiles for future deployment. In Period 2, Player 1 produces zero-day exploits for immediate deployment, supplemented by stockpiled zero-day exploits from Period 1. Player 2 defends in both periods. The...
Persistent link: https://www.econbiz.de/10012432466
Persistent link: https://www.econbiz.de/10011901414
Persistent link: https://www.econbiz.de/10011804219
Zero-Knowledge Proof-of-Identity from trusted public certificates (e.g., national identity cards and/or ePassports; eSIM) is introduced here to permissionless blockchains in order to remove the inefficiencies of Sybil-resistant mechanisms such as Proof-of-Work (i.e., high energy and...
Persistent link: https://www.econbiz.de/10014106106
Causality for Risk Analysts: Improving Our Understanding of How the World Works -- Improving Individual Risk Management Decisions: Learning from Experience and Coping with Model Uncertainty -- Improving Community Risk Management: Managing Disaster Risks -- Improving Organizational Risk...
Persistent link: https://www.econbiz.de/10014016501
We build an analytical framework to model the strategic interactions between a firm and hackers. Firms invest in security to defend against cyber attacks by hackers. Hackers choose an optimal attack, and they share information with each other about the firm's vulnerabilities. Each hacker prefers...
Persistent link: https://www.econbiz.de/10014026808