Aron

Results: 406



#Item
71

FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources Aron Laszka1, Gabor Horvath2, Mark Felegyhazi2, and Levente Buttyan2 1:

Add to Reading List

Source URL: aronlaszka.com

Language: English - Date: 2015-02-08 13:32:51
    72

    Optimal Personalized Filtering Against Spear-Phishing Attacks Aron Laszka and Yevgeniy Vorobeychik and Xenofon Koutsoukos Institute for Software Integrated Systems Department of Electrical Engineering and Computer Scienc

    Add to Reading List

    Source URL: aronlaszka.com

    Language: English - Date: 2015-02-08 13:36:23
      73

      Bitspotting: Detecting Optimal Adaptive Steganography Benjamin Johnsona , Pascal Sch¨ottleb , Aron Laszkac , Jens Grossklagsd , and Rainer B¨ohmeb a Department of Mathematics, University of California, Berkeley, USA

      Add to Reading List

      Source URL: aronlaszka.com

      Language: English - Date: 2014-11-20 15:28:13
        74

        0 Secure Team Composition to Thwart Insider Threats and Cyberespionage ARON LASZKA, Pennsylvania State University BENJAMIN JOHNSON, University of California, Berkeley ¨

        Add to Reading List

        Source URL: aronlaszka.com

        Language: English - Date: 2014-11-20 15:28:39
          75

          Quality, Incentives and Inspection Regimes in Offshore Service Production: Theory & Evidence Krishnan S. Anand • Ravi Aron The Wharton School of the University of Pennsylvania The Marshall School of Business, Universi

          Add to Reading List

          Source URL: digital.mit.edu

          Language: English - Date: 2006-09-09 12:10:58
            76

            Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats Aron Laszka 1,2 Benjamin Johnson 3 Pascal Sch¨ottle Jens Grossklags 1 Rainer B¨

            Add to Reading List

            Source URL: aronlaszka.com

            Language: English - Date: 2015-02-08 13:32:47
              77

              FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources Aron Laszka1 , Gabor Horvath2 , Mark Felegyhazi2 , and Levente Butty´an2 1 Institute for Software Integrated Systems (ISIS)

              Add to Reading List

              Source URL: aronlaszka.com

              Language: English - Date: 2014-11-20 15:28:39
                78

                Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks Aron Laszka1,2 Benjamin Johnson3 1 Pennsylvania

                Add to Reading List

                Source URL: aronlaszka.com

                Language: English - Date: 2015-02-08 13:32:48
                  79

                  Monitoring Stealthy Diffusion Nika Haghtalab∗ , Aron Laszka† , Ariel D. Procaccia∗ , Yevgeniy Vorobeychik† and Xenofon Koutsoukos† ∗ Carnegie Mellon University {nhaghtal,arielpro}@cs.cmu.edu

                  Add to Reading List

                  Source URL: aronlaszka.com

                  Language: English - Date: 2015-08-30 13:58:01
                    80

                    Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks Aron Laszka1,2 , Benjamin Johnson3 , and Jens Grossklags1 1

                    Add to Reading List

                    Source URL: aronlaszka.com

                    Language: English - Date: 2014-11-20 15:28:26
                      UPDATE