Keyword: security

Found 180 papers in total
Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory
2016,
Counterterrorism decisions have been an intense area of research in recent years. Both...
In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models
2016,
A key objective for policymakers and analysts dealing with terrorist threats is trying...
Supply Chain Vulnerability Analysis Using Scenario-Based Input-Output Modeling: Application to Port Operations
2016,
Disruptive events such as natural disasters, loss or reduction of resources, work...
The Concepts of Risk, Safety, and Security: Applications in Everyday Language
2016,
The concepts of risk, safety, and security have received substantial academic...
A note on time-bound hierarchical key assignment schemes
2013,
A time‐bound hierarchical key assignment scheme is a method to assign...
A new method to determine algebraic expression of power mapping based S-boxes
2013,
Power mapping based S‐boxes, especially those with finite field inversion, have...
Desynchronization attack on RAPP ultralightweight authentication protocol
2013,
RAPP (RFID Authentication Protocol with Permutation) is a recently proposed and...
Preimage and pseudo-collision attacks on step-reduced SM3 hash function
2013,
SM3 [12] is the Chinese cryptographic hash standard which was announced in 2010 and...
Optimal allocation of protective resources in urban rail transit networks against intentional attacks
2015,
This paper advances the field of network interdiction analysis by introducing an...
Managing Logistics in Regional Banknote Supply Chain Under Security Concerns
2015,
We study the logistics problem faced by Regional Branches (RBs) of a central bank in...
Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
2011,
Recently, Wang and Hu have proposed a high‐density quadratic compact knapsack...
Signaling game based strategy of intrusion detection in wireless sensor networks
2011,
As Wireless Sensor Networks (WSNs) become increasingly popular, it is necessary to...
Whither Risk Assessment: New Challenges and Opportunities a Third of a Century After the Red Book
2015,
Six multi‐decade‐long members of SRA reflect on the 1983 Red Book in...
The wireless network jamming problem subject to protocol interference
2016,
We study the following questions related to wireless network security: Which jammer...
A model for evaluating computer network security systems with 2-tuple linguistic information
2011,
With respect to comprehensive evaluation model for computer network security with...
Probabilistic modelling of security of supply in gas networks and evaluation of new infrastructure
2015,
The paper presents a probabilistic model to study security of supply in a gas network....
Energy security in East Asia under climate mitigation scenarios in the 21st century
2016,
Japan, China, and South Korea depend heavily on imports for most of their energy. This...
Do context and personality matter? Trust and privacy concerns in disclosing private information online
2016,
Research and business practice have already established the central role of trust in...
Optimal response to epidemics and cyber attacks in networks
2015,
This article introduces novel formulations for optimally responding to epidemics and...
A tale of two standards: strengthening HIPAA security regulations using the PCI-DSS
2015,
This paper both illustrates the inadequacy of current Health Insurance Portability and...
Societal Ageing in the Netherlands: A Robust System Dynamics Approach
2015,
Societal ageing is a messy problem with diverging stakeholder views regarding the...
A game-theoretic analysis of information sharing and security investment for complementary firms
2014,
This paper investigates information sharing and security investments by two firms...
The study on the methods of secure communications on mobile device for intelligent services
2014,
Intelligent environments connect freely available to all things on the network. But...
Adopting security practices for transport logistics: institutional effects and performance drivers
2014,
The field of transport logistics security has garnered extensive attention by both...
Papers per page: