Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture Change

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ESORICS (24. : 2019 : Luxemburg) Computer security
1. Verfasser: Lester, Hugh D. (VerfasserIn)
Weitere Verfasser: Miller, Martin J. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Towards the Creation of a Threat Intelligence Framework for Maritime Infrastructures 2020 Pitropakis, Nikolaos
Connect and Protect: Requirements for Maritime Autonomous Surface Ship in Urban Passenger Transportation 2020 Amro, Ahmed
Simulation-Based Evaluation of DDoS Against Smart Grid SCADAs 2020 Gogic, Damjan
How Not to Use a Privacy-Preserving Computation Platform: Case Study of a Voting Application 2020 Willemson, Jan
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems 2020 Athinaiou, Myrsini
Shaping Digital Identities in Social Networks: Data Elements and the Role of Privacy Concerns 2020 Papaioannou, Thanos
Uncertainty-Aware Authentication Model for IoT 2020 Heydari, Mohammad
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study 2020 Liu, Yang
Discrete Event Simulation of Jail Operations in Pursuit of Organizational Culture Change 2020 Lester, Hugh D.
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists 2020 Nozawa, Kohei
A Proposed Privacy Impact Assessment Method Using Metrics Based on Organizational Characteristics 2020 Makri, Eleni-Laskarina
GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers 2020 Georgiopoulou, Zafeiroula
On the Applicability of Security and Privacy Threat Modeling for Blockchain Applications 2020 Landuyt, Dimitri Van
An Insight into Decisive Factors in Cloud Provider Selection with a Focus on Security 2020 Pape, Sebastian
Selective Forwarding Attack on IoT Home Security Kits 2020 Hariri, Ali
Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things 2020 Vassilakis, Philokypros P. Ioulianou Vassilios G.
Secure Location Verification: Why You Want Your Verifiers to Be Mobile 2020 Schäfer, Matthias
Anomaly Detection for Industrial Control Systems Using Sequence-to-Sequence Neural Networks 2020 Kim, Jonguk
Reflective Attenuation of Cyber-Physical Attacks 2020 Segovia, Mariana
Identifying Safety and Human Factors Issues in Rail Using IRIS and CAIRIS 2020 Altaf, Amna
Alle Artikel auflisten