Auditing Rational Adversaries to Provably Manage Risks (CMU-CyLab-12-011)
暂无分享,去创建一个
Nicolas Christin | Anupam Datta | Jeremiah Blocki | Arunesh Sinha | Jeremiah Blocki | Nicolas Christin | Anupam Datta | Arunesh Sinha
[1] Alessandro Acquisti,et al. Empirical Analysis of Data Breach Litigation , 2013, WEIS.
[2] Limin Jia,et al. Policy auditing over incomplete logs: theory, implementation and applications , 2011, CCS '11.
[3] Joan Feigenbaum,et al. Towards a formal model of accountability , 2011, NSPW '11.
[4] Nicolas Christin,et al. Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[5] Frank L. Greitzer,et al. Modeling Human Behavior to Anticipate Insider Attacks , 2011 .
[6] Xia Zhao,et al. Access Governance: Flexibility with Escalation and Audit , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[7] Robert D. Nowak,et al. Noisy Generalized Binary Search , 2009, NIPS.
[8] Radha Jagadeesan,et al. Towards a Theory of Accountability and Audit , 2009, ESORICS.
[9] Sajal K. Das,et al. Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.
[10] Limin Jia,et al. Evidence-Based Audit , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[11] Nicolas Christin,et al. Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.
[12] John C. Mitchell,et al. Privacy and Utility in Business Processes , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[13] Jerry den Hartog,et al. Audit-based compliance control , 2007, International Journal of Information Security.
[14] Richard M. Karp,et al. Noisy binary search and its applications , 2007, SODA '07.
[15] Dawn M. Cappelli,et al. Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis , 2006 .
[16] G. Mailath,et al. Repeated Games and Reputations: Long-Run Relationships , 2006 .
[17] Christopher Meek,et al. Adversarial learning , 2005, KDD '05.
[18] John C. Mitchell,et al. Compositional analysis of contract signing protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).
[19] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[20] J. Schummer. Almost-dominant Strategy Implementation , 1999 .
[21] Casey Ichniowski,et al. The Effects of Human Resource Management Practices on Productivity , 1995 .
[22] Nicolò Cesa-Bianchi,et al. On-line learning with malicious noise and the closure algorithm , 1994, Annals of Mathematics and Artificial Intelligence.
[23] Ming Li,et al. Learning in the presence of malicious errors , 1993, STOC '88.
[24] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[25] W. Hoeffding. Probability inequalities for sum of bounded random variables , 1963 .
[26] Blaine Nelson,et al. Behavior of Machine Learning Algorithms in Adversarial Environments , 2010 .
[27] Hal R. Varian,et al. System Reliability and Free Riding , 2004, Economics of Information Security.
[28] E. Hanushek. Statistical methods for social scientists , 1977 .