Governing Cybersecurity Risks and Benefits of the Internet of Things: Connected Medical and Health Devices and Connected Vehicles
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Concern about the increasingly high-probability, high-impact risks posed by global warming is driving the exploration of new techniques to artificially cool the planet through an approach known as solar radiation modification (SRM). Would the world be bett ...
We develop an exchange rate target zone model with finite exit time and non-Gaussian tails. We show how the tails are a consequence of time-varying investor risk aversion, which generates mean-preserving spreads in the fundamental distribution. We solve ex ...
Volume 2 of the IRGC Resource Guide on Resilience provides an in-depth and pragmatic evaluation of concepts and methods for resilience-based approaches in contrast to risk-based approaches, as proposed and practised in different domains of science and prac ...
This thesis examines how banks choose their optimal capital structure and cash reserves in the presence of regulatory measures. The first chapter, titled Bank Capital Structure and Tail Risk, presents a bank capital structure model in which bank assets a ...
Neighborhood-scale projects often commence with the conceptualization of several massing-schemes as potential design solutions. There is growing interest in using building performance simulation (BPS) to evaluate and rank such conceptual stage schemes in o ...
If an artificial intelligence aims to maximize risk-adjusted return, then under mild conditions it is disproportionately likely to pick an unethical strategy unless the objective function allows sufficiently for this risk. Even if the proportion eta of ava ...
We present a self-organised method for quickly obtaining the epidemic threshold of infective processes on networks. Starting from simple percolation models, we introduce the possibility that the effective infection probability is affected by the perception ...
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this pa ...
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any d ...
We present an analysis of the SwissCovid application which is currently being tested. We observe that the essential part of SwissCovid is under the control of Apple and Google. Outsourcing the heart of SwissCovid to Apple and Google has apparent benefits i ...