Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy
 For more images, please select "images" in the filters.
The Japan-South Korea history issue: the emotional outcome of trusting acts and met/unmet alignment security expectations
PDF
Memorable, secure, and usable authentication secrets
PDF
Towards addressing spatio-temporal aspects in security games
PDF
Pdf
Keep the adversary guessing: agent security by policy randomization
Modeling human bounded rationality in opportunistic security games
PDF
Pdf
Accrual quality and expected returns: the importance of controlling for cash flow shocks
Not a Lone Ranger: unleashing defender teamwork in security games
PDF
Pdf
Computational model of human behavior in security games with varying number of targets
Shyness, attachment security, and cognitive abilities: measurement and relationships
PDF
Effects of eliminating the unfunded social security system in an economy with entrepreneurs
PDF
Handling attacker’s preference in security domains: robust optimization and learning approaches
PDF
Combating adversaries under uncertainties in real-world security problems: advanced game-theoretic behavioral models and robust algorithms
PDF
Status, security, and socialization: explaining change in China's compliance in international institutions
PDF
How do securities analysts respond to different types of news events?
PDF
Leveraging programmability and machine learning for distributed network management to improve security and performance
PDF
Improving network security through cyber-insurance
PDF
Campaigning for a seat on the United Nations Security Council: a middle power reflection on the role of public diplomacy, 2011
PDF
Transportation security officer engagement in the Transportation Security Administration: a study of a promising practice
PDF
The human element: addressing human adversaries in security domains
PDF
Addressing uncertainty in Stackelberg games for security: models and algorithms
PDF
Human adversaries in security games: integrating models of bounded rationality and fast algorithms
PDF
Security and privacy in information processing
PDF
The first 90 days: securing early success in the superintendency
PDF
On scheduling, timeliness and security in large scale distributed computing
PDF
Balancing tradeoffs in security games: handling defenders and adversaries with multiple objectives
PDF
of 164