Behavioral Cybersecurity最新文献

筛选
英文 中文
Behavioral Economics 行为经济学
Behavioral Cybersecurity Pub Date : 2019-04-25 DOI: 10.1201/9780429461484-23
W. Patterson, Cynthia E. Winston-Proctor
{"title":"Behavioral Economics","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-23","DOIUrl":"https://doi.org/10.1201/9780429461484-23","url":null,"abstract":"","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125466877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theory 博弈理论
Behavioral Cybersecurity Pub Date : 2019-04-25 DOI: 10.1201/9780429461484-13
W. Patterson, Cynthia E. Winston-Proctor
{"title":"Game Theory","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-13","DOIUrl":"https://doi.org/10.1201/9780429461484-13","url":null,"abstract":"Combinatorial games, a branch of game theory, allows us to further understand the topic of decision making and uses simple games to work out different strategies that result in various outcomes. It introduces rational thinking where a player makes decisions based on the outcomes it will bring them. This method of thinking can be applied to larger fields such as economics and finance for parties to maximize their own income. In this paper, we will explore game theory in the branch combinatorial games through a broad view. This will be done through the aid of the game Pick-Up-Bricks and game trees. We will then take a deeper look into a category of combinatorial games, Normal-Play Games. To understand how they work, we will look at the example of Cut-cake. We will continue on to talk about the four different types of games, sum of games, and the properties of positions in normal play games. Afterwards, we will discuss impartial games and introduce the MEX Principle by analysing the game Nim. Lastly, we will apply the MEX Principle to the game of Shade.","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hack Lab 4 黑客实验室4
Behavioral Cybersecurity Pub Date : 2019-04-25 DOI: 10.1201/9780429461484-26
W. Patterson, Cynthia E. Winston-Proctor
{"title":"Hack Lab 4","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-26","DOIUrl":"https://doi.org/10.1201/9780429461484-26","url":null,"abstract":"","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Access Control 访问控制
Behavioral Cybersecurity Pub Date : 2019-04-25 DOI: 10.1201/9780429461484-7
W. Patterson, Cynthia E. Winston-Proctor
{"title":"Access Control","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-7","DOIUrl":"https://doi.org/10.1201/9780429461484-7","url":null,"abstract":"","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133733599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Cryptography 现代密码学
Behavioral Cybersecurity Pub Date : 2018-11-08 DOI: 10.1201/9780429461484-19
W. Patterson, Cynthia E. Winston-Proctor
{"title":"Modern Cryptography","authors":"W. Patterson, Cynthia E. Winston-Proctor","doi":"10.1201/9780429461484-19","DOIUrl":"https://doi.org/10.1201/9780429461484-19","url":null,"abstract":"We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers. An extremely important algorithm in today’s practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 22048 or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Metric to Assess Cyberattacks 评估网络攻击的指标
Behavioral Cybersecurity Pub Date : 2018-06-24 DOI: 10.1007/978-3-319-94782-2_4
W. Patterson, M. E. Sone
{"title":"A Metric to Assess Cyberattacks","authors":"W. Patterson, M. E. Sone","doi":"10.1007/978-3-319-94782-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-94782-2_4","url":null,"abstract":"","PeriodicalId":137249,"journal":{"name":"Behavioral Cybersecurity","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信