منابع مشابه
Strategic aspects of cyberattack, attribution, and blame.
Cyber conflict is now a common and potentially dangerous occurrence. The target typically faces a strategic choice based on its ability to attribute the attack to a specific perpetrator and whether it has a viable punishment at its disposal. We present a game-theoretic model, in which the best strategic choice for the victim depends on the vulnerability of the attacker, the knowledge level of t...
متن کاملCyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach
With the rapid growth of mobile applications and cloud computing, mobile cloud computing has attracted great interest from both academia and industry. However, mobile cloud applications are facing security issues such as data integrity, users’ confidentiality, and service availability. A preventive approach to such problems is to detect and isolate cyber threats before they can cause serious im...
متن کاملAttribution Theory
Attribution theory (Weiner, 1980, 1992) is probably the most influential contemporary theory with implications for academic motivation. It incorporates behavior modification in the sense that it emphasizes the idea that learners are strongly motivated by the pleasant outcome of being able to feel good about themselves. It incorporates cognitive theory and self-efficacy theory in the sense that ...
متن کاملAuthorship Attribution
Authorship attribution, the science of inferring characteristics of the author from the characteristics of documents written by that author, is a problem with a long history and a wide range of application. Recent work in “non-traditional” authorship attribution demonstrates the practicality of automatically analyzing documents based on authorial style, but the state of the art is confusing. An...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: AJIL Unbound
سال: 2019
ISSN: 2398-7723
DOI: 10.1017/aju.2019.33