نتایج جستجو برای: trade secrets and etsn

تعداد نتایج: 16839256  

Journal: :Philosophical Transactions of the Royal Society of London. Series B: Biological Sciences 1999

2013

Today’s industry and government organizations are highlighting cyber security and information assurance as one of their top IT priorities. Cyber threats are presented by both individuals and nation-sponsored groups with intentions spanning the theft of trade secrets, “hacktivism” (the invasion or disruption of systems for activist purposes) and espionage. Similarly, new problems are rising arou...

2007
Dorothy E. Denning

At least on the surface, most cyber attacks appear to be clearly unethical as well as illegal. These include attacks performed for amusement or bragging rights, such as web defacements conducted “just for fun” and computer viruses launched out of curiosity but disregard for their consequences. They also include attacks done for personal gain, such as system intrusions to steal credit card numbe...

2003
Alison Chorley Trevor Bench-Capon

In this paper we report some experiments designed to clarify some issues and to test some of the assumptions in the model of reasoning with legal cases advanced by Bench-Capon and Sartor. We identify the questions to be explored, briefly describe a tool developed to support these experiments and report the results of a series of experiments based on Aleven’s analysis of US Trade Secrets cases. ...

2007
Susan Hohenberger Zachary Scott

The goal of program obfuscation is to provably complicate the task of reverse engineering. Owners of source code wish to make it as hard as possible for others to extract information from their binaries information which may reveal trade secrets, allow undesirable modifications, or enable software piracy. Obfuscation is typically seen as a problem relating to programming languages or compilers....

2017
Miguel A. Garcia

In contrast to the explosion of consumer wearable health device market, which includes millions of units sold worldwide, the efforts undertaken to validate the accuracy and reliability of these monitoring apps and devices have been minimal [1]. To reach this understanding there are several barriers. In the domain of sleep tracking, sleep researchers have yet to define standard metrics for valid...

2003
Marcel Fernandez Miguel Soriano

In the guessing secrets problem defined by Chung, Graham and Leighton [9], player B has to unveil a set of k > 1 secrets that player A has chosen from a pool of N secrets. To discover the secrets, player B is allowed to ask a series of boolean questions. For each question asked, A can adversarially choose one of the secrets but once he has made his choice he must answer truthfully. In this pape...

Journal: :E3S web of conferences 2021

In the actual process of web crawler infringement and criminal identification, there is a theory “weakening typology strengthening presumption legal interest”. This also basic method for subsequent identification in commercial application enterprise data through technology. article summarizes risks abusing technology based on previous work experience. The author discusses judicial interpretatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید