Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
105 | Michel Rudnianski, Helene Bestougeff |
Deterrence and Defeasibility in Argumentation Process for ALIS Project. |
Computable Models of the Law, Languages, Dialogues, Games, Ontologies |
2008 |
DBLP DOI BibTeX RDF |
ALIS, defeasibility, game of deterrence, graph of deterrence, rebutting, consistency, argumentation, attack, strategy, relevance, acceptability, playability |
72 | David Elliott |
Deterring Strategic Cyberattack. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
cyberattack deterrence, cyberwar, nuclear deterrence versus cyber deterrence, cyber security |
57 | Henrique Lopes Cardoso, Eugénio C. Oliveira |
Risk Tolerance and Social Awareness: Adapting Deterrence Sanctions to Agent Populations. |
EPIA |
2009 |
DBLP DOI BibTeX RDF |
|
57 | Don Radlauer |
Rational Choice Deterrence and Israeli Counter-Terrorism. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Neelam Jain, Thomas D. Jeitschko, Leonard J. Mirman |
Strategic Experimentation in Financial Intermediation with Threat of Entry. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
strategic experimentation, signal dampening, financial intermediation, limit pricing, entry deterrence, experimentation |
42 | Nasser Al Azwani |
Optimizing deterrence strategies in state-state cyber conflicts: theoretical models for strategic cyber deterrence. |
|
2020 |
RDF |
|
42 | Joseph C. Ugrin, J. Michael Pearson |
Understanding the Effect of Deterrence Mechanisms on cyberloafing: Exploring a General Deterrence Model with a Social Perspective. |
ICIS |
2010 |
DBLP BibTeX RDF |
|
39 | Michel Rudnianski, Helene Bestougeff |
Congestion Control in Multi-Agent Systems Through Dynamic Games of Deterrence. |
WRAC |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Michel Rudnianski, Helene Bestougeff |
Multi-agent Systems Reliability, Fuzziness, and Deterrence. |
FAABS |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Pinata Winoto |
Controlling Malevolent Behavior in Open Multi-Agent Systems by Means of Deterrence Theory. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Fernando Sanchez, Zhenhai Duan |
Region-based BGP announcement filtering for improved BGP security. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
BGP security, network prefix hijacking, BGP |
36 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
36 | Nasir D. Memon, Ping Wah Wong |
A buyer-seller watermarking protocol. |
IEEE Trans. Image Process. |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Fred B. Schneider, Deirdre K. Mulligan |
A Doctrinal Thesis. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
cybersecurity policy, public cybersecurity, deterrence through accountability |
24 | Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood |
Compliance with Information Security Policies: An Empirical Investigation. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Information security policy, Deterrence theory, Protection motivation theory, Security, Security and privacy |
24 | James Bret Michael, Eneken Tikk, Peter Wahlgren, Thomas C. Wingfield |
From Chaos to Collective Defense. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Deterrence, Arms Control, Security, Policy, Conflict, Law |
24 | Nikolay Archak |
Money, glory and cheap talk: analyzing strategic behavior of contestants in simultaneous crowdsourcing contests on TopCoder.com. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
all-pay auction, cheap talk, entry deterrence, reputation, electronic markets, crowdsourcing, contest |
24 | Wayne W. Liu |
Identifying and Addressing Rogue Servers in Countering Internet Email Misuse. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
deterrence, identification, trust management, email, Accountability, false positives, misuse, e-discovery |
24 | Yuqun Chen, Mehmet Kivanç Mihçak, Darko Kirovski |
Certifying authenticity via fiber-infused paper. |
SIGecom Exch. |
2005 |
DBLP DOI BibTeX RDF |
anti-piracy, certificates of authenticity, counterfeit deterrence, security, economics |
24 | Shing-Chi Cheung, Dickson K. W. Chiu |
A Watermarking Infrastructure for Enterprise Document Management. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management |
24 | Shing-Chi Cheung, Hanif Curreem |
Rights Protection for Digital Contents Redistribution Over the Internet. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
copy deterrence, watermarking protocols, E-commerce, digital watermarking, copyright protection, digital rights management, digital certificate |
21 | Abdullah Alqahtani 0003, Frederick T. Sheldon |
eMIFS: A Normalized Hyperbolic Ransomware Deterrence Model Yielding Greater Accuracy and Overall Performance. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Siyu Ma, Yair Tauman, Richard Zeckhauser |
Deterrence games and the disruption of information. |
Int. J. Game Theory |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Javier Rubio-Herrero, Jesús Muñuzuri |
Sparse regression for data-driven deterrence functions in gravity models. |
Ann. Oper. Res. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Mayra Salcedo-Gonzalez, Julio Suarez-Paez, Manuel Esteve, Carlos Enrique Palau |
Spatiotemporal Predictive Geo-Visualization of Criminal Activity for Application to Real-Time Systems for Crime Deterrence, Prevention and Control. |
ISPRS Int. J. Geo Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | A. J. Burns 0001, Tom L. Roberts, Clay Posey, Paul Benjamin Lowry, Bryan Fuller |
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse. |
Inf. Syst. Res. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Soumya Ray, Kamta Nath Mishra, Sandip Dutta |
An Innovative Technique for DDoS Attack Recognition and Deterrence on M-Health Sensitive Data. |
Wirel. Pers. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang |
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan W. Welburn, Justin Grana, Karen Schwindt |
Cyber deterrence with imperfect attribution and unverifiable signaling. |
Eur. J. Oper. Res. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Dario Miocevic |
Deterrence and defiance as responses to copyright enforcement policies of digital content: appraisal tendency perspective. |
Inf. Technol. People |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Tongxin Yin, Armin Sarabi, Mingyan Liu |
Deterrence, Backup, or Insurance: Game-Theoretic Modeling of Ransomware. |
Games |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Erica D. Lonergan, Jacquelyn Schneider |
The Power of Beliefs in US Cyber Strategy: The Evolving Role of Deterrence, Norms, and Escalation. |
J. Cybersecur. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Han Fang, Jiyi Zhang, Yupeng Qiu, Jiayang Liu, Ke Xu, Chengfang Fang, Ee-Chien Chang |
Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence. |
ICCV |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Anuj S. Vora, Ankur A. Kulkarni |
Fraud Detection and Deterrence in Electronic Voting Machines: A Game-Theoretic Approach. |
CDC |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Kaden Hart, Chad D. Mano, John Edwards 0002 |
Plagiarism Deterrence in CS1 Through Keystroke Data. |
SIGCSE (1) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jocelyn Hsu, Gregory Falco |
Space Booby Traps: Hacking Back and Assured Cyber Deterrence in Space. |
ICAA |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Marina Agranov, Anastasia Buyalskaya |
Deterrence Effects of Enforcement Schemes: An Experimental Study. |
Manag. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Katsiaryna Bahamazava, Rohan Nanda |
The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence. |
Digit. Investig. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Santosh Bhusal, Manoj Karkee, Uddhav Bhattarai, Yaqoob Majeed, Qin Zhang 0012 |
Automated execution of a pest bird deterrence system using a programmable unmanned aerial vehicle (UAV). |
Comput. Electron. Agric. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Fabrizio Schiano, Dominik Natter, Davide Zambrano, Dario Floreano |
Autonomous Detection and Deterrence of Pigeons on Buildings by Drones. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Ashwani Kumar |
A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving. |
Multim. Tools Appl. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Amin Azmoodeh, Ali Dehghantanha |
Deep Fake Detection, Deterrence and Response: Challenges and Opportunities. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Simon J. Cohen, Michael J. Martin, Chance A. Shipley, Abhishek Kumar, Andrew R. Cohen |
Plagiarism deterrence for introductory programming. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jiajia Nie, Ling Zhong, Gendao Li, Kuo Cao |
Piracy as an entry deterrence strategy in software market. |
Eur. J. Oper. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Yan Chen 0016, Weidong Xia, Karlene Cousins |
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Mingshi Yue, Songtao Zhang, Zhen Zhang |
Deterrence effect of risk aversion information sharing on supplier encroachment. |
Comput. Ind. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Mikko T. Siponen, Wael Soliman, Anthony Vance |
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions. |
Data Base |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Martin C. Libicki |
Obnoxious Deterrence. |
CyCom |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Bong-Keun Jeong, Tom E. Yoon, Sarah S. Khan |
Improving the Effectiveness of Anti-Piracy Educational Deterrence Efforts: The Role of Message Frame, Issue Involvement, Risk Perception, and Message Evidence on Perceived Message Effectiveness. |
J. Theor. Appl. Electron. Commer. Res. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yuxiang Hong, Mengyi Xu |
Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence. |
J. Organ. End User Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Przemyslaw G. Hensel, Agnieszka Kacprzak |
Curbing cyberloafing: studying general and specific deterrence effects with field evidence. |
Eur. J. Inf. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Friedel Bolle |
Deterrence by Collective Punishment May Work against Criminals but Never against Freedom Fighters. |
Games |
2021 |
DBLP DOI BibTeX RDF |
|
21 | David Maimon, C. Jordan Howell, George W. Burruss |
Restrictive deterrence and the scope of hackers' reoffending: Findings from two randomized field trials. |
Comput. Hum. Behav. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wenhui Zhu, Yuhang Zheng, Kunhui Ye, Qian Zhang, Minjie Zhang |
Deterrence of Punitive Measures on Collusive Bidding in the Construction Sector. |
Complex. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Nobumasa Akiyama |
AI Nuclear Winter or AI That Saves Humanity? AI and Nuclear Deterrence. |
Robotics, AI, and Humanity |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Takumi Kitagawa, Tetsushi Ohki, Yuki Koizumi, Yoshinobu Kawabe, Toru Hasegawa, Masakatsu Nishigaki |
Deterrence-Based Trust: A Study on Improving the Credibility of Social Media Messages in Disaster Using Registered Volunteers. |
NBiS |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yuanjie Li, Hewu Li, Zhizheng Lv, Xingkun Yao, Qianru Li, Jianping Wu |
Deterrence of Intelligent DDoS via Multi-Hop Traffic Divergence. |
CCS |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Caleb Boadi, Emmanuel Awuni Kolog |
Social Media Aggression: An Assessment Based on the Contemporary Deterrence Theory. |
AMCIS |
2021 |
DBLP BibTeX RDF |
|
21 | Jeremy Straub |
Consideration of the Use of Smart Grid Cyberattacks as an Influence Attack and Appropriate Deterrence. |
CSCI |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Kosei Miyano, Ryoichi Shinkuma, Narushige Shiode, Shino Shiode, Takehiro Sato, Eiji Oki |
Multi-UAV Allocation Framework for Predictive Crime Deterrence and Data Acquisition. |
Internet Things |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Johannes Thumfart |
Public and private just wars: Distributed cyber deterrence based on Vitoria and Grotius. |
Internet Policy Rev. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Kalana Malimage, Nirmalee I. Raddatz, Brad S. Trinkle, Robert E. Crossler, Rebecca Baaske |
Impact of Deterrence and Inertia on Information Security Policy Changes. |
J. Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Kuang-Ming Kuo, Paul C. Talley, Chi Hsien Huang |
A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors. |
Comput. Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Md. Mazharul Islam 0001, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim |
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. |
SecureComm (1) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Lan Sun |
Entry Deterrence Game Under Ambiguity. |
ICIC (1) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Mustafa Senol |
Türkiye\'nin ulusal siber güvenlik strateji ve politikalarının oluşturulması çerçevesinde caydırıcılık (Deterrence within the framework of creating Turkey\'s national cybersecurity strategies and policies) |
|
2020 |
RDF |
|
21 | Lina Bouayad, Balaji Padmanabhan, Kaushal Chari |
Audit Policies Under the Sentinel Effect: Deterrence-Driven Algorithms. |
Inf. Syst. Res. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Soo Kyung Park, Kyu Tae Kwak, Bong Gyou Lee |
Policy compliance and deterrence mechanism in the sharing economy. |
Internet Res. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Elizabeth Stoycheff, Juan Liu, Kai Xu, Kunto Adi Wibowo |
Privacy and the Panopticon: Online mass surveillance's deterrence and chilling effects. |
New Media Soc. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Nader Sohrabi Safa, Carsten Maple, Steven M. Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak |
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
21 | Nick F. D. Huberts, Herbert Dawid, Kuno J. M. Huisman, Peter M. Kort |
Entry deterrence by timing rather than overinvestment in a strategic real options framework. |
Eur. J. Oper. Res. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Kuang-Ming Kuo, Paul C. Talley, Tain-Junn Cheng |
Deterrence approach on the compliance with electronic medical records privacy policy: the moderating role of computer monitoring. |
BMC Medical Informatics Decis. Mak. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Nader Sohrabi Safa, Carsten Maple, Steven Furnell, Muhammad Ajmal Azad, Charith Perera, Mohammad Dabbagh, Mehdi Sookhak |
Deterrence and prevention-based model to mitigate information security insider threats in organisations. |
Future Gener. Comput. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad I. Merhi, Punit Ahluwalia |
Examining the impact of deterrence factors and norms on resistance to Information Systems Security. |
Comput. Hum. Behav. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Simon Trang 0001, Alfred Benedikt Brendel |
A Meta-Analysis of Deterrence Theory in Information Security Policy Compliance Research. |
Inf. Syst. Frontiers |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Tim-Benjamin Lembcke, Kristin Masuch, Simon Trang 0001, Sebastian Hengstler, Patience Plics, Mustafa Pamuk |
Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory. |
AMCIS |
2019 |
DBLP BibTeX RDF |
|
21 | Jason Healey, Neil Jenkins |
Rough-and-Ready: A Policy Framework to Determine if Cyber Deterrence is Working or Failing. |
CyCon |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Braden C. Soper |
A Cyber-Nuclear Deterrence Game. |
Allerton |
2019 |
DBLP DOI BibTeX RDF |
|
21 | J. Anthony Cookson |
Anticipated Entry and Entry Deterrence: Evidence from the American Casino Industry. |
Manag. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Anol Bhattacherjee, Utkarsh Shrivastava |
The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective. |
Gov. Inf. Q. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Robert Willison, Merrill Warkentin, Allen C. Johnston |
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. |
Inf. Syst. J. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Robert Willison, Paul Benjamin Lowry, Raymond Paternoster |
A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence to Inspire New Directions in Behavioral and Organizational Security Research. |
J. Assoc. Inf. Syst. |
2018 |
DBLP BibTeX RDF |
|
21 | Myeonggil Choi, Jeongseok Song |
Social control through deterrence on the compliance with information security policy. |
Soft Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Dirk Westhoff, Maximilian Zeiser |
Measuring the World: How the Smartphone Industry Impacts Cyber Deterrence Credibility. |
Int. J. Cyber Warf. Terror. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Stéphane Gonzalez, Aymeric Lardon |
Optimal deterrence of cooperation. |
Int. J. Game Theory |
2018 |
DBLP DOI BibTeX RDF |
|
21 | David Sikolia, Douglas P. Twitchell, Glen W. Sagers |
Protection Motivation and Deterrence: Evidence from a Fortune 100 Company. |
AIS Trans. Replication Res. |
2018 |
DBLP BibTeX RDF |
|
21 | Megumi Fujiwara, Fumiaki Sato |
Deterrence System for Texting-While-Walking Focused on User Situation. |
NBiS |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Liguo Lou, Joon Koh |
Deterrence and Reciprocity Approaches for Enhancing User Participation in the Sharing Economy. |
PACIS |
2018 |
DBLP BibTeX RDF |
|
21 | Sze Yiu Chau, Omar Chowdhury, Victor E. Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li |
Adaptive Deterrence of DNS Cache Poisoning. |
SecureComm (2) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Aaron F. Brantly |
The cyber deterrence problem. |
CyCon |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Simon Trang 0001 |
When Does Deterrence Work? A Moderation Meta-analysis of Employees' Information Security Policy Behavior. |
ICIS |
2018 |
DBLP BibTeX RDF |
|
21 | Hiroya Kato, Ryuya Uda |
Texting while Walking Deterrence System by Vibration of Smartphone. |
IMCOM |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Geoffrey P. Morgan, Michael J. Lanham, William Frankenstein, Kathleen M. Carley |
Sociocultural Models of Nuclear Deterrence. |
IEEE Trans. Comput. Soc. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Kai Lung Hui, Seung-Hyun Kim, Qiu-Hong Wang |
Cybercrime Deterrence and International Legislation: Evidence from Distributed Denial of Service Attacks. |
MIS Q. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Mariarosaria Taddeo |
Deterrence by Norms to Stop Interstate Cyber Attacks. |
Minds Mach. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Mario Silic, Jordan B. Barlow, Andrea Back |
A new perspective on neutralization and deterrence: Predicting shadow IT usage. |
Inf. Manag. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Kuang-Ming Kuo, Paul C. Talley, Ming-Chien Hung, Yen-Liang Chen |
A Deterrence Approach to Regulate Nurses' Compliance with Electronic Medical Records Privacy Policy. |
J. Medical Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Salvatore Aurigemma, Thomas Mattson |
Deterrence and punishment experience impacts on ISP compliance attitudes. |
Inf. Comput. Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Zhaohong Wang, Sen-Ching S. Cheung, Ying Luo 0008 |
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. |
IEEE Trans. Inf. Forensics Secur. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Jinshu Cui, Heather Rosoff, Richard S. John |
Deterrence of Cyber Attackers in a Three-Player Behavioral Game. |
GameSec |
2017 |
DBLP DOI BibTeX RDF |
|