نتایج جستجو برای: threats

تعداد نتایج: 31573  

2017
ABRAHAM NEYMAN

A game of threats on a finite set of players, N , is a function d that assigns a real number to any coalition, S ⊆ N , such that d(S) = −d(N \S). A game of threats is not necessarily a coalitional game as it may fail to satisfy the condition d(∅) = 0. We show that analogs of the classic Shapley axioms for coaltional games determine a unique value for games of threats. This value assigns to each...

2006
A. COOPER DRURY YITAN LI

Recent literature argues that economic sanction threats should be more successful because both sender and target have an incentive to resolve their dispute before entering into costly sanction. Testing this assertion is somewhat problematic because threats are essentially nonevents Fsanctions that were never deployed. This paper quantifies the U.S. threats to condition or revoke China’s most fa...

2010
Christian W. Probst Jeffrey Hunker Dieter Gollmann Matt Bishop

The insider threat has received considerable attention, and is often cited as the most serious security problem. It is also considered the most difficult problem to deal with, because an “insider” has information and capabilities not known to external attackers. The difficulty in handling the insider threat is reasonable under those circumstances; if one cannot define a problem precisely, how c...

2012

Cybercriminals today are organized, sophisticated and have powerful resources at their fingertips. In most cases, attacks are initiated with specific targets and objectives in mind. The aim is to infiltrate hosts in networks and steal valuable data. The data may be personal information, accounts or intellectual property. This information can be used for future attacks (second stage) to further ...

2017
Damiano Di Francesco Maesa

In this paper we explain the basics of Bitcoin protocol and the state of the art of the main attacks to it. We first present an overview of digital currencies, showing what they are and the social need they aim to satisfy. We then focus on the main digital currency up to date, Bitcoin. We treat the basics of the protocol showing what are addresses and transactions and how they are used in a dis...

Journal: :Emerging Infectious Diseases 1999
M. G. Kortepeter G. W. Parker

The list of agents that could pose the greatest public health risk in the event of a bioterrorist attack is short. However, although short, the list includes agents that, if acquired and properly disseminated, could cause a difficult public health challenge in terms of our ability to limit the numbers of casualties and control the damage to our cities and nation. The use of biological weapons h...

2015
Hakan Erdem Serhat Ünal

Infectious diseases have caused great catastrophes in human history, as in the example of the plague, which wiped out half of the population in Europe in the 14th century. Ebola virus and H7N9 avian influenza virus are 2 lethal pathogens that we have encountered in the second decade of the 21st century. Ebola infection is currently being seen in West Africa, and H7N9 avian flu appears to have s...

2006
Peter Leimgruber Daniel S Kelly Thomas Müller Jamie Robertson Melissa A Songer Catherine A Christen

The Indo-Myanmar (Indo-Burma) Hotspot is one of the most threatened hotspots globally: it ranks among the eight hotspots likely to lose most plants and vertebrates as a result of forest loss continuing at its current rate (Brooks et al. 2002). Throughout the hotspot, a combination of population growth, economic development, increasing consumption and integration into the global economy is placi...

Journal: :Network Security 2011
Steve Mansfield-Devine

According to a report from Prolexic, one of the first and largest companies offering DDoS mitigation services, ⁠ attack traffic rose 66% over the course of a year (to Q3 2011). 1 Network-layer attacks accounted for 83%, the rest being application-layer attacks. The average duration was 1.4 days and the average bandwidth consumed was 1.5Gbps. The size of attacks is getting bigger, too. In July 2...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید