Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2012
- Ross J. Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Michel van Eeten, Michael Levi, Tyler Moore, Stefan Savage:
Measuring the Cost of Cybercrime. WEIS 2012 - Adrian Baldwin, Iffat Gheyas, Christos Ioannidis, David J. Pym, Julian Williams:
Contagion in Cybersecurity Attacks. WEIS 2012 - Yuliy M. Baryshnikov:
IT Security Investment and Gordon-Loeb's 1/e Rule. WEIS 2012 - Jörg Becker, Dominic Breuker, Tobias Heide, Justus Holler, Hans Peter Rauer, Rainer Böhme:
Can We Afford Integrity by Proof-of-Work? Scenarios Inspired by the Bitcoin Currency. WEIS 2012 - Matthias Brecht, Thomas Nowey:
A Closer Look at Information Security Costs. WEIS 2012 - Min Chen, Varghese S. Jacob, Suresh Radhakrishnan, Young U. Ryu:
The Effect of Fraud Investigation Cost on Pay-Per-Click Advertising. WEIS 2012 - Lukas Demetz, Daniel Bachlechner:
To Invest or Not to Invest? Assessing the Economic Viability of a Policy and Security Configuration Management Tool. WEIS 2012 - Serge Egelman, Adrienne Porter Felt, David A. Wagner:
Choice Architecture and Smartphone Privacy: There's a Price for That. WEIS 2012 - Vaibhav Garg, Chris Kanich, L. Jean Camp:
Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer. WEIS 2012 - Martin S. Gaynor, Muhammad Zia Hydari, Rahul Telang:
Is Patient Data Better Protected in Competitive Healthcare Markets? WEIS 2012 - Cormac Herley:
Why do Nigerian Scammers Say They are From Nigeria? WEIS 2012 - Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura:
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks. WEIS 2012 - Timothy Kelley, L. Jean Camp:
Online Promiscuity: Prophylactic Patching and the Spread of Computer Transmitted Infections. WEIS 2012 - Juhee Kwon, M. Eric Johnson:
Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance. WEIS 2012 - Miguel Malheiros, Sacha Brostoff, Charlene Jennett, M. Angela Sasse:
Would You Sell Your Mother's Data? Personal Data Disclosure in a Simulated Credit Card Application. WEIS 2012 - Stephan Neuhaus, Bernhard Plattner:
Software Security Economics: Theory, in Practice. WEIS 2012 - Sören Preibusch, Kat Krol, Alastair R. Beresford:
The Privacy Economics of Voluntary Over-disclosure in Web Forms. WEIS 2012 - Sasha Romanosky, David Hoffman, Alessandro Acquisti:
Empirical Analysis of Data Breach Litigation. WEIS 2012 - Toshihiko Takemura, Ayako Komatsu:
Who Sometimes Violates the Rule of the Organizations? An Empirical Study on Information Security Behaviors and Awareness. WEIS 2012 - Nevena Vratonjic, Mohammad Hossein Manshaei, Jens Grossklags, Jean-Pierre Hubaux:
Ad-blocking Games: Monetizing Online Content Under the Threat of Ad Avoidance. WEIS 2012 - 11th Annual Workshop on the Economics of Information Security, WEIS 2012, Berlin, Germany, 25-26 June, 2012. 2012 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 22:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint