User Tools

Site Tools


attackereconomics

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Last revisionBoth sides next revision
attackereconomics [2019/05/29 11:24] – [Attacker models] rwoutersattackereconomics [2019/05/29 11:26] – [Attacker models] rwouters
Line 51: Line 51:
  
 The paper "[[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2862299|The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures]]" formally defines this attacker model by employing Stokey's Logic of Inaction, whereby an economic actor will decide to //do nothing// until a certain condition is reached. The paper "[[https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2862299|The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures]]" formally defines this attacker model by employing Stokey's Logic of Inaction, whereby an economic actor will decide to //do nothing// until a certain condition is reached.
- 
-This is a test edit. 
- 
-[[surveypage|new link]] 
  
 ===== References ===== ===== References =====
attackereconomics.txt · Last modified: 2021/01/10 21:04 by 127.0.0.1