Embedding European values in data governance: A case for public data commons

JJ Zygmuntowski, L Zoboli, P Nemitz - Internet Policy Review, 2021 - econstor.eu
The public sphere needs an" ecosystem of trust" which could set out objectives of re-usage
of data for the common good while protecting individual rights. This study analyses the …

Asymmetric players in Prisons Dilemma Game

Z Han, P Zhu, J Yang, J Yang - Chaos, Solitons & Fractals, 2023 - Elsevier
Evolutionary game theory can solve social dilemmas in multiple areas. There are examples
in the literature of the use of this approach to analyze topics like economics, social behavior …

Game theoretical modelling of network/cybersecurity

A Iqbal, LJ Gunn, M Guo, MA Babar, D Abbott - IEEE Access, 2019 - ieeexplore.ieee.org
Game theory is an established branch of mathematics that offers a rich set of mathematical
tools for multi-person strategic decision making that can be used to model the interactions of …

Mathematical approaches transform cybersecurity from protoscience to science

I Trenchev, W Dimitrov, G Dimitrov, T Ostrovska… - Applied Sciences, 2023 - mdpi.com
The area of cybersecurity problems has reached the stage of becoming a science. This
raises questions about the connection between the mathematical theories used in …

Beyond the prisoner's dilemma: The social dilemmas of cybersecurity

JR Schoenherr, R Thomson - 2020 international conference on …, 2020 - ieeexplore.ieee.org
The Prisoner's Dilemma represents an ubiquitous approach to security modeling that
emphasizes adversarial relationships between actors. Adopting this approach helps …

Mitigation of block withholding attack based on zero-determinant strategy

M Ren, H Guo, Z Wang - PeerJ Computer Science, 2022 - peerj.com
This article focuses on the mining dilemma of block withholding attack between the mining
pools in the bitcoin system. In order to obtain the higher revenue, the rational mining pool …

Cyber war games: strategic jostling among traditional adversaries

S Goel, Y Hong - Cyber Warfare: Building the Scientific Foundation, 2015 - Springer
Cyber warfare has been simmering for a long time and has gradually morphed into a key
strategic weapon in international conflicts. Doctrines of several countries consider cyber …

[图书][B] The Open World, Hackbacks and Global Justice

AJ Thomas - 2023 - Springer
One of the greatest gifts bestowed upon the global community by the Western world is the
belief that persons, information, good and services, and access to commonly cherished …

Surveillance and Disruption

AJ Thomas - The Open World, Hackbacks and Global Justice, 2023 - Springer
The capabilities critique of fairness and welfare in cyberspace redefines the limits of global
justice. Retaliatory hackback provisions in American state/federal law and international law …

[PDF][PDF] WHISPERED SPEECH CAUSES DISRUPTION OF SERIAL SHORT-TERM MEMORY

PF Scholz, RMM Spitz… - FECHNER DAY …, 2023 - fondazionepatriziopaoletti.org
Task-irrelevant speech is known to disrupt serial short-term memory, and this phenomenon
has been explained with either interference-by-process or attentional capture. In the present …