Perverse Effects in Defense of Computer Systems: When More is Less

Jan 12, 2025
By:

A dataset for identifying actionable feedback in collaborative software development

Jan 12, 2025
By:

Uncovering elements of style

Jan 12, 2025
By:

When Cyber Threats Loom, What Can State and Local Governments Do?

Jan 12, 2025
By:

Application-layer design patterns for accountable–anonymous online identities

Jan 12, 2025
By:

What we talk about when we talk about cybersecurity: security in internet governance debates

Jan 12, 2025
By:

Perverse Effects in Defense of Computer Systems: When More Is Less

Jan 12, 2025
By:

You'll see this message when it is too late The Legal and Economic Aftermath of Cybersecurity Breaches

Jan 12, 2025
By:

"CYBERWAR BY ALMOST ANY DEFINITION": NOTPETYA, THE EVOLUTION OF INSURANCE WAR EXCLUSIONS, AND THEIR APPLICATION TO CYBERATTACKS

Jan 12, 2025
By:

Cyberinsurance Policy Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks

Jan 12, 2025
By:
Subscribe to