Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory
2016,
Merrick Jason R W
Counterterrorism decisions have been an intense area of research in recent years. Both...
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models
2016,
Montibeller Gilberto
A key objective for policymakers and analysts dealing with terrorist threats is trying...
Supply Chain Vulnerability Analysis Using Scenario-Based Input-Output Modeling: Application to Port Operations
2016,
Santos Joost R
Disruptive events such as natural disasters, loss or reduction of resources, work...
The Concepts of Risk, Safety, and Security: Applications in Everyday Language
2016,
Boholm Max
The concepts of risk, safety, and security have received substantial academic...
A note on time-bound hierarchical key assignment schemes
2013,
Ateniese Giuseppe
A time‐bound hierarchical key assignment scheme is a method to assign...
A new method to determine algebraic expression of power mapping based S-boxes
2013,
Karaahmetoglu Osman
Power mapping based S‐boxes, especially those with finite field inversion, have...
Desynchronization attack on RAPP ultralightweight authentication protocol
2013,
Ahmadian Zahra
RAPP (RFID Authentication Protocol with Permutation) is a recently proposed and...
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
2013,
Wang Gaoli
SM3 [12] is the Chinese cryptographic hash standard which was announced in 2010 and...
Optimal allocation of protective resources in urban rail transit networks against intentional attacks
2015,
Jin Jian Gang
This paper advances the field of network interdiction analysis by introducing an...
Managing Logistics in Regional Banknote Supply Chain Under Security Concerns
2015,
Sriskandarajah Chelliah
We study the logistics problem faced by Regional Branches (RBs) of a central bank in...
Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
2011,
Lee Moon Sung
Recently, Wang and Hu have proposed a high‐density quadratic compact knapsack...
Signaling game based strategy of intrusion detection in wireless sensor networks
2011,
Xu Hongyun
As Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to...
Whither Risk Assessment: New Challenges and Opportunities a Third of a Century After the Red Book
2015,
Greenberg Michael
Six multi‐decade‐long members of SRA reflect on the 1983 Red Book in...
The wireless network jamming problem subject to protocol interference
2016,
Medal Hugh R
We study the following questions related to wireless network security: Which jammer...
A model for evaluating computer network security systems with 2-tuple linguistic information
2011,
Zhang Shilin
With respect to comprehensive evaluation model for computer network security with...
Probabilistic modelling of security of supply in gas networks and evaluation of new infrastructure
2015,
Praks Pavel
The paper presents a probabilistic model to study security of supply in a gas network....
Energy security in East Asia under climate mitigation scenarios in the 21st century
2016,
Matsumoto Ken'ichi
Japan, China, and South Korea depend heavily on imports for most of their energy. This...
Do context and personality matter? Trust and privacy concerns in disclosing private information online
2016,
Gefen David
Research and business practice have already established the central role of trust in...
Optimal response to epidemics and cyber attacks in networks
2015,
Leyffer Sven
This article introduces novel formulations for optimally responding to epidemics and...
A tale of two standards: strengthening HIPAA security regulations using the PCI-DSS
2015,
Gaynor Mark
This paper both illustrates the inadequacy of current Health Insurance Portability and...
Societal Ageing in the Netherlands: A Robust System Dynamics Approach
2015,
Pruyt Erik
Societal ageing is a messy problem with diverging stakeholder views regarding the...
A game-theoretic analysis of information sharing and security investment for complementary firms
2014,
Zhong Weijun
This paper investigates information sharing and security investments by two firms...
The study on the methods of secure communications on mobile device for intelligent services
2014,
Kim Kyongjin
Intelligent environments connect freely available to all things on the network. But...
Adopting security practices for transport logistics: institutional effects and performance drivers
2014,
Koufteros Xenophon A
The field of transport logistics security has garnered extensive attention by both...
First Page
1
2
3
4
5
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers