نتایج جستجو برای: security papers

تعداد نتایج: 265761  

2017
Ferrucio de Franco Rosa Mario Jino

A literature survey on ontologies concerning the Security Assessment domain has been carried out to uncover initiatives that aim at formalizing concepts from the “Security Assessment” field of research. A preliminary analysis and a discussion on the selected works are presented. Our main contribution is an updated literature review, describing key characteristics, results, research issues, and ...

2015
Kazuko Kano

Examining a state-dependent pricing model in the presence of menu costs and dynamic duopolistic interactions, this paper claims that the assumption regarding market structure is crucial for identifying the menu costs for price changes. Prices in a dynamic duopolistic market can be more rigid than those in more competitive markets, such as a monopolistic-competition market. Therefore, the estima...

2015
Klaus Wohlrabe Katharina Rath

This article updates Kelly and Bruestle (2011) by illustrating how publication trends in different subject categories in economics evolved from 2007 to 2013. Using data from RePEc we show that the largest increase in the relative share was for articles published in JEL category Q (“Agricultural and Natural Resource Economics, Environmental and Ecological Economics”) over this period. Furthermor...

2016
John Vickers Mark Armstrong

We provide a simple necessary and suffi cient condition for when a multiproduct demand system can be generated from a discrete choice model with unit demands.

1996
Paul Levine

We develop an endogenous growth model driven by externalities of both private capital and public infrastructure.

2006
DAWN SONG

Dawn Song is an Assistant Professor at Carnegie Mellon University. She obtained her PhD in Computer Science from UC Berkeley. Her research interest lies in security and privacy issues in computer systems and networks. She is the author of more than 35 research papers in areas ranging from software security, networking security, database security, distributed systems security, to applied cryptog...

2013
Sravan Kumar Jonnalagadda Ravi Prakash Reddy Carla E. Brodley

With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks are being faced by industries. As the threat becomes a serious matter year by year, intrusion detection technologies are indispensable for network and computer security. A variety of intrusion detection approaches be present to resolve this...

2013
Ferda Halicioglu Ferda HALICIOGLU

The objective of this research is to provide a statistical measurement to predict the likely winners of international football tournaments with particular reference to the Euro 2008 football tournament. This research argues that there exists a positive relationship between the competitive balance and success in international football tournaments. The level of the competitive balance in a domest...

2015
Ofer H. Azar

Journal articles are sometimes later reprinted as chapters of edited books. The question whether citations of this material should mention the book or the journal has significant implications. I describe several advantages of citing the journal: it allows the readers to locate the material more easily and to handle it more conveniently (when it is available electronically); it gives a better si...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید