SlideShare a Scribd company logo
Resilience by Usable Security
Workshop(Usable Security(and Privacy
Mensch(und(Computer(2015
University(of Stuttgart
September(6,(2015
Dr.(Sven(Wohlgemuth
<wohlgemuth@acm.org>
Dr.$Sven$Wohlgemuth
Dr.$Sven$Wohlgemuth Resilience$by$Usable$Security 2
• Diploma(in$computer$science$with$economics$at$University$of$Saarland,$Saarbrücken
(Prof.$B.$Pfitzmann)$(Key$Management$– OO$Design$and Implementation)
• Dr.+Ing. on$Privacy$with$Delegation$of$Rights$at$AlbertLLudwigs University$Freiburg,$(Prof.$
Müller)$(Security$and$usability$with$identity$management,$DFG$SPP$Sicherheit &$EU$FIDIS)
• JSPS(&(DAAD(postdoctoral(fellow(on$PrivacyLcompliant$Delegation$of$Personal$Data$at$
National$Institute$of$Informatics$(NII), Tokyo,$Japan$(Prof.$Echizen)$(Content$Security$Lab)
• Associate(professor(within DataLCentric$Social$Systems$of$Research$Organization$for$
Information$and$Systems$and$NII,$Tokyo,$Japan$(Prof.$Sonehara)$(Transparency for ICT$
Resilience &$JapaneseLEuropean$Institute$for Security)
• Senior(consultant(IT(security(and(project(manager at$Sirrix AG$security$technologies
(A.$Alkassar)$(Information$flow control for$Internet$of$Things$and$Cloud$Computing)
• Senior(researcher entrusted$with$Coordinator$and$Community$Manager$of$PersoApp on$
supporting$open$source$software$development$of$secure$and$userLfriendly$Internet$
applications$with$the$German$national$ID$card$funded$by$BMI$at$CASED/TU$Darmstadt$
associated$with$Intel$ICRILSC$(Prof.$Sadeghi)$
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 3
“TEPCO(did(have(a(backup(for(the(emergency(generators:(power(supply(trucks(outfitted(
with(highTvoltage(dynamos.(That(afternoon,(emergency(managers(at(TEPCO's(Tokyo(
headquarters(sent(11(power(supply(trucks(racing(toward(Fukushima(DaiTichi,(250(km(away.(
They(promptly(got(stuck(in(traffic.(The(roads(that(hadn't(been(damaged(by(the(earthquake(
or(tsunami(were(clogged(with(residents(fleeing(the(disaster(sites.([...](It(was(after(midnight(
when(the(first(power(supply(trucks(began(to(arrive(at(the(site,(creeping(along(cracked(roads.”(
IEEE#Spectrum.#24#Hours#of#Fukushima.#October#31,#2011
http://spectrum.ieee.org/energy/nuclear/24DhoursDatDfukushima/0
“Whether(blocked(or(prohibited,(the(local(
highly(restricted(road(transport(systems(have(
disrupted(various(rescue(and(delivery(
activities(in(the(disaster(area.”
ITS#Japan.#March#28,#2011
http://www.itsDjp.org/english/its_asia/553/
The2Great2East2Japan2Earthquake
Agenda
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 4
I. Resilienceand Secondary Use
• Dependencies threatencontrol
• Control(bytransparency
II. Multilateral(Security
• Usage control
• PrivacyTEnhanced(AAA(A)
III. Big(Data(and Privacy
• From login to control bytransparency
• Loss(ofcontrol
IV. Usable Security
• Multilateral(secondaryuse
• Byzantine agreement
I.#Resilience and Secondary Use
Dr.$Sven$Wohlgemuth Resilience$by$Usable$Security 5
Resilience:)Predictive risk management to remain in$or return to an$equilibrium
by IT)support in)real4time)with secondary use of personal)information
Public>private$cooperation:$
Public$traffic road map
(03/19/2011)
Localization at$Disney$Resort$
Tokyo$(08/02/2011)
User$generated content on$
Google$Maps (08/02/2011)
Support2by CyberDPhysical Systems
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 6
PAN
Wide(Area(Network
ALLTIP(Network
Cyber2World
CPS(data(platform
Real2World
Sensor(
networks
in
Home(
Building(facility
Vehicle(NW
Policy(decision(support(
based(on(information(
processing
Power(Grid(system,
Environment(monitor,
Agriculture,(etc.
Sensing(&(
Actuation((control)
Service(
control
Transport(System
human(state
Collection(
and(sharing(
of(context(
and(data
N.#Sonehara,# 2011
d,#d*
Information2Usage Model
......
Dr.(Sven(Wohlgemuth Resilience by Usable Security 7
d
Data(provider
/consumer
Data(consumer
Data(consumer
/provider
Data(provider
Secondary(usePrimary(use
• Dependencies(occur(at(runTtime(and(threaten(information(processing
d, d*
Information Usage Model
............
Dr. Sven Wohlgemuth Resilience by Usable Security 8
• Problem: Users lose control on their identity
d
Data provider
/consumer
Data consumer
Data consumer
/provider
Data provider
d, d*
Secondary usePrimary use
• Dependencies occur at run‐time and threaten information processing
Data providerData provider
Data consumer
/provider
Data consumer Data provider
Dependency:2Users2and IT2System
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 9
10
48
42
20
0
10
20
30
40
50
60
Problem1Category1I Problem1Category1II Problem1Category1III Problem1Category1IV
Citations
75%(of identified problems are
usability problems with negative(effect
on(user‘s security
• User(has(to(learn(technical(concept
• SigG(digital(signature(client(Signtrust:(
“Maloperation”(raises(security(incident
• 7(Internet(user(groups(in(Germany
People(with less security expertise
(approx.(70%)(want to delegate
privacy to TTP
• Responsibility:(
selfTprotection(or(privacy(by(a(TTP
D.#Gerd# tom Markotten 2004;#G.#Müller#and S.#Wohlgemuth# 2005;#DIVSI#2012
Dependency: Third Party
Dr. Sven Wohlgemuth Resilience by Usable Security 10
Case (a): Passive incident Case (b): Active incident
• Inevitable, not‐modelled dependencies during run‐time
K.W. Hamlen, G. Morrisett, and F.B. Schneider 2006; A. Grusho, N. Grebnev, and E. Timonina 2007; BSI 2015
• For Germany: Indirect attacks on Internet of Things and Cloud Computing
Assumption: Each IT system is secure
d, d*
d
Data provider
/consumer
Data consumer
Data consumer
/provider
Data provider
Data consumer
/provder
Data provider
/consumer
d, d*
d
Data provider
/consumer
Data consumer
Data consumer
/provider
Data provider
Data consumer
/provder
Data provider
/consumer
faulty
d, d*
Impossible to TM‐decide on covert dependencies, but statistically
Loss of control by conceptual dependency of 
compromised TTP
Dependency:2Machine Learning
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 11
Loss(of(control(on(classification
Data(analytics(as(secondary(use(of(personal(information
“Faulty”(data(increases(error(rate(of(machine(learning
Supervised machine learning
(z.B.(SVM)
Unsupervised machine learning
(z.B.(PCA)
d,#d*
......
d
Data%provider
/consumer
Data%consumer
Data%consumer
/provider
Data%provider
d,#d* d,#d*Data%provider
/consumer
Data%consumer
/provider
Data%consumer Data%provider
B.#Biggio,# B.#Nelson,# and# P.#Laskov 2012;#L.#Huang,# A.D.#Joseph,# B.#Nelson,# B.I.#Rubenstein,# and#J.#Tygar 2011
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 12
Variety(and(Volume:(Information(flow(from(different(sources
Aggregation(of(anonymized(data(implies(information(leakage
Loss(of(control(on(confidentiality(and(classification
......
d
Data%provider
/consumer
Data%consumer
Data%consumer
/provider
Data%provider
d,#d*Data%provider
/consumer
Dependency:2Aggregation
Bob David
Explicit/friendship
Implicitly assumed friendship
L. Sweeney 2002
C. Jernigan and B. Mistree, 2007
Example:2Google2Photos‘2Classification
Dr.(Sven(Wohlgemuth 13
Control2by2Transparency
• Recipient:(Transparency(for(accountability(and(to(restore(information
• Sender:(Encryption(to(prevent(information(leakage
Self+protection(depends(on(opposite(security(interests
C.E.#Shannon# #1948,# 1949;#Dolev# and# Yao##1983
Dr.(Sven(Wohlgemuth Resilience by Usable Security 14
......
d
Data%provider
/consumer
Data%consumer
Data%consumer
/provider
Data%provider
d,#d*Data%provider
/consumer
Control2by2Transparency
• Recipient:(Transparency(for(accountability(and(to(restore(information
• Sender:(Encryption(to(prevent(information(leakage
Self+protection(depends(on(opposite(security(interests
C.E.#Shannon# #1948,# 1949;#Dolev# and# Yao##1983
Dr.(Sven(Wohlgemuth Resilience by Usable Security 15
Agenda
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 16
I. Resilienceand Secondary Use
• Dependencies threatencontrol
• Control(bytransparency
II. Multilateral(Security
• Usage control
• PrivacyTEnhanced(AAA(A)
III. Big(Data(and Privacy
• From login to control bytransparency
• Loss(ofcontrol
IV. Usable Security
• Multilateral(secondaryuse
• Byzantine agreement
II.2Multilateral2Security
Combining opposite security interests by an(equilibrium setting
• Accountability:(Authentic(information(on(information(processing
• Unobservability:(NonTlinkability to(impede(reTidentification
G.#Müller,# K.#Rannenberg and A.#Pfitzmann 1996;#I.#Echizen,# G.#Müller,# R.#Sasaki,#and A#Min#Tjoa,# 2013
Dr.(Sven(Wohlgemuth Resilience by Usable Security 17
Accountability
Unobservability
Anonymity
Pseudonymity
Traceability Personal(
information
Privacy
II.2Multilateral2Security
Combining opposite security interests by an(equilibrium setting
• Accountability:(Authentic(information(on(information(processing
• Unobservability:(NonTlinkability to(impede(reTidentification
G.#Müller,# K.#Rannenberg and A.#Pfitzmann 1996;#I.#Echizen,# G.#Müller,# R.#Sasaki,#and A#Min#Tjoa,# 2013
Dr.(Sven(Wohlgemuth Resilience by Usable Security 18
Accountability
Unobservability
Usage(control
Control(by(
transparency
Anonymity
Pseudonymity
Traceability
Personal(
information
Personal(
information
Privacy
Privacy
Enforcement:2AAA(A)
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 19
Data(consumer/
provider
Data(consumer/
provider
Data(consumer/
provider
1:(Authentication
AAA(A)
service
Open(Internet(standard RFC(2904(AAA(Authorization Framework
d,#d*
2:(Authorization
3:(Accounting
+(Accountability for information exchange via(hidden,(inevitable dependencies
4:(Accountabilityd,#d*
d,#d*
PrivacyDEnhanced2Authentication
Digital( driving(licence?
Dig.(driving
licence
Car?
Car
Erika
Mustermann
543ag
Driving
licence
Erika1Mustermann
Classes:1ABE
Mornewegstr,123
D<642931Darmstadt
Germany
Motorbike
Hans1im1Glück
Harley1Davidson
IP:
Car
543ag
VW1Beetle
Identity(Management:(User+controlled disclosure of personal(information
• Unobservability by anonymousPKI((Partial(identities and cryptographic protocols)
• Accountability by allTorTnothing linking to master identity (PKI(and cryptograpic protocols)
• Revealing(identity(of(cheating(users((PKI(and(cryptographic(protocols)
U.#Jendricke 2003;#A.#Pfitzmann# and M.#Hansen#2010;# J.#Camenisch et#al.#2014
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 20
Example:2iManager
CeBIT(2003(Scenario:(Buying an(electronic(railway ticket
Current partial(identity Necessary personal
information
Proposed partial(identity
S.#Wohlgemuth,# U.#Jendricke,# D.#Gerd# tom Markotten,# F.#Dorner,# and G.#Müller# 2003
doITTSoftware(Award(2003(of(German(Federal(State(BadenTWürttemberg
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 21
Example:)German)national)ID)Card
• Biometric)authentication)(souvereign)only)
PKI$based*applications*of*German*national*ID*card:
• Electronic*identity
• Electronic)signature
Mutual*authentication*with*option*for*pseudonymity
BSI)TR:03130)Technical)Guideline)eID:Server
Dr.)Sven)Wohlgemuth Resilience)by)Usable)Security 22
PersoApp:*Secure*and*user$friendly*Internet*applications
• Verification)of)certificates)by)eID server)(TTP)
• Open)source)code)at)GoogleCode for)PC)(Java))and)Internet)of)Things)(Android)OS)
• Identification)of)IT)security)vulnerabilities)for)payment)with)REWE)Group
• With)advisory)board)members:)Springer)special)issue)“Security)and)
privacy)in)business)networking”
PrivacyDEnhanced2Authorization
• Decentralized:(NonTlinkable(delegation(of(rights(on(information
• All+or+nothing:(Loss(of control if delegating credentials
Control(by(
Transparency
Control Transparency
Transparency
System(1
DP/DC
System(3
DP/DC
System(2
DP/DC
d,#d* d,# d,#d*
Policy
d
Control
System(4
DP/DC
d,#d*
d,#d*
Policy
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 23
PrivacyDEnhanced2Accountability
Transparency
Transparency
Transparency
System 1
DP/DC
System 3
DP/DC
System 2
DP/DC
d, d*
System 4
DP/DC
d, d*
d, d*
System 2
d, d*
System 2
System 3
d, d*
System 2
System 3
System 4
d, d*
System 2
System 3
System 4
System 3
Control
• Hidden(channels:(Information(leakage and modification
• Accountability:(Data(provenance on(information exchange for audit
Impeding nonTauthorized
reTidentification
Unobservability
Misuse(of(d,#d* can(be(detected
Accountability and availability
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 24
Privacy‐Enhanced Accounting
Deduction system
Privacy policy
Query: d, d*
Query: identity
Query:
authorization
Result:
Autd,d*
Cryptographic key, certificate, revocation, trust statement, …
…
Logical statement on authentication of d, d* from user‘s view (on a PKI)
Deriving information on
accountability
Dr. Sven Wohlgemuth Resilience by Usable Security 25
Agenda
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 26
I. Resilienceand Secondary Use
• Dependencies threatencontrol
• Control(bytransparency
II. Multilateral(Security
• Usage control
• PrivacyTEnhanced(AAA(A)
III. Big(Data(and Privacy
• From login to control bytransparency
• Loss(ofcontrol
IV. Usable Security
• Multilateral(secondaryuse
• Byzantine agreement
III.2Big2Data2and Privacy
Data(provider
DataTcentric
service
d
Authentication Authentication
Data(consumer
d,#d*
Authorization,(Accounting,(Accountability
Transparency
(PrivacyTenhanced
Authentication(and
Accountability)
Transparency
(PrivacyTenhanced
Authentication(and
Accountability)
Control
(Authorization and
PrivacyTenhanced
Accounting)
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 27
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 28
Keyword search
File systems
Groupware Databases
Social networking Wiki
Semantic search
Tagging
Reasoning
Smart personal agents
Natural language search
Mashups
Productivity
Amount(of(data
PC Era
Web 1.0
Web 2.0
Web 3.0
Web 4.0
Desktop
The World Wide Web
The Social Web
The Semantic Web
The Intelligent Web
Own#figure# based#on#Radar# Networks# &#Nova# Spivack 2007,# E.#Brynjolfsson and# A.#McAfee#2011.
From Login2to Control2by Transparency
Human-machine interaction
Machine-machine interaction
Centralized information processing
Ubiquitous P2P information
processing
(Internet of Things)
Decentralized P2P information
processing
(Cloud Computing)
... with automatic
decision support
(Cyber-Physical
Systems)
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 29
Productivity
Amount(of(data
PC Era
Web 1.0
Web 2.0
Web 3.0
Web 4.0
Desktop
The World Wide Web
The Social Web
The Semantic Web
The Intelligent Web
Human-machine interaction
Machine-machine interaction
Centralized information processing
Ubiquitous P2P information
processing
(Internet of Things)
Decentralized P2P information
processing
(Cloud Computing)
... with automatic
decision support
(Cyber-Physical
Systems)
Own#figure# based#on#Radar# Networks# &#Nova# Spivack 2007,# E.#Brynjolfsson and# A.#McAfee#2011.
From Login2to Control2by Transparency
Dr.$Sven$Wohlgemuth Resilience$by$Usable$Security 30
Productivity
Amount.of.data
PC Era
Web 1.0
Web 2.0
Web 3.0
Web 4.0
Desktop
The World Wide Web
The Social Web
The Semantic Web
The Intelligent Web
Human-machine interaction
Machine-machine interaction
Centralized information processing
Ubiquitous P2P information
processing
(Internet of Things)
Decentralized P2P information
processing
(Cloud Computing)
... with automatic
decision support
(Cyber-Physical
Systems)
Own$figure$ based$on$Radar$ Networks$ &$Nova$ Spivack 2007,$ E.$Brynjolfsson and$ A.$McAfee$2011.
Accounting
Accountability
One-factor
authentication
Multi-factor
authentication
Authorization
Increasing$entropy$
of$auth.information
From Login)to Control)by Transparency
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 31
Productivity
Amount(of(data
PC Era
Web 1.0
Web 2.0
Web 3.0
Web 4.0
Desktop
The World Wide Web
The Social Web
The Semantic Web
The Intelligent Web
Human-machine interaction
Machine-machine interaction
Centralized information processing
Ubiquitous P2P information
processing
(Internet of Things)
Decentralized P2P information
processing
(Cloud Computing)
... with automatic
decision support
(Cyber-Physical
Systems)
Own#figure# based#on#Radar# Networks# &#Nova# Spivack 2007,# E.#Brynjolfsson and# A.#McAfee#2011.
Accounting
Accountability
One-factor
authentication
Multi-factor
authentication
Authorization
Increasing(entropy(
of(auth.information
From Login2to Control2by Transparency
Dr.$Sven$Wohlgemuth Resilience$by$Usable$Security 32
W.#Wahlster&#G.#Müller.#Placing#Humans#in#the#Feedback#Loop#of#Social#Infrastructures;#NII#
Strategies#on#CyberEPhysical#Systems.#2013
Data$Centric Service
Data$provide
Data=centric
service
d
Data$consumer
d,#d*
Improving$attractivity
Increasing$market$share
Lock=in
Network
Economies$of$scale
G.#Müller,#T.#Eymann,#M.#Kreutzer,#2003
Accountability
Unobservability
Usage2control
Control2by2
transparency
Anonymity
Pseudonymity
Traceability Personal3
information
Privacy
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 33
W.#Wahlster &#G.#Müller.#Placing# Humand in#the#Feedback#Loop# of#Social# Infrastructures;#
NII#Strategies# on#CyberDPhysical# Systems.#2013
DataDCentric Service
Data(provide
DataTcentric
service
d
Data(consumer
d,#d*
Improving(attractivity
Increasing(market(share
LockTin
Network
Economies(of(scale
Müller,# Eymann,# Kreutzer,# 2003
Who(am(I?
You are a(dog and your
friend sitting close to
you is a(B/W(dog.
Loss(of control by asymmetric distribution of information
Accountability
Unobservability
Usage2control
Control2by2
transparency
Anonymity
Pseudonymity
Traceability Personal3
information
Privacy
Example:2Privacy2Dashboard
Privacy+Enhanced(
Accountability
• No transparency on(secondary
use
Data+Centric Service
• Transparency(on(information(from(user(
• Transparency on(data
provenance
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 34
Agenda
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 35
I. Resilienceand Secondary Use
• Dependencies threatencontrol
• Control(bytransparency
II. Multilateral(Security
• Usage control
• PrivacyTEnhanced(AAA(A)
III. Big(Data(and Privacy
• From login to control bytransparency
• Loss(ofcontrol
IV. Usable Security
• Multilateral(secondaryuse
• Byzantine Agreement
IV.$Usable Security
From loss of control
To informational self-determination:0Byzantine Agreement0on0secondary use
Data$provider/
consumer
Data$consumer/
provider
Data$consumer/
consumer
d*
d*
d*
Dr.-Sven-Wohlgemuth Resilience-by-Usable-Security 36
Data$provider
Data,centric
service
d
Data$consumer
d,#d*
Consensus:(Control(by(Sender
Data$consumer/
provider
• Consensus:(Users$agree$on$information
• Authentic(information:(Consensus$by$trusted$users$by$correctness$&$consistency
Data$consumer/
provider
Data$provider
d*
L.%Lamport,%R.%Shostak,%M.%Pease 1982;%M.J.%Fischer,%N.A.%Lynch,%M.S.%Paterson%1985;%M.%Waidner 1991
d*
d*
d*
• Asynchronous(communication: No$consensus$possible,$if$one$user$fails
• Synchronous communication:$Tolerance without cryptography:$t$<$n/3$
faulty processes (with authentic key exchange:$t$<$n/2)
Impossibility results:
Dr.$Sven$Wohlgemuth Resilience$by$Usable$Security 37
Consensus:2SelfDOrganization
• Consensus(on(state transitions within community of distributed,(vulnerable(users
Data(consumer/
provider
Data(consumer/
provider
Data(consumer/
provider
d* … d*
d*
• Users(change(role(during(runTtime((“miner“(checks transactions and gets reward )
S.#Nakamoto 2009
• Provenance by irreversible,(decentralized database with eCoin system
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 38
Decentralized Usage Control
• Secondary use of symmetric distribution of personal(security information
PrivacyTEnhanced(
Authorization
… … …
PrivacyTEnhanced
Accountability
PrivacyTEnhanced
Accounting
A A A
• Trust(anchor:(Registered,(nonTlinkableeID (PrivacyTEnhanced(Authentication)
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 39
• Acceptable authentic information decreases individual(risk on(loss of control
• UserTcontrol on(identity is threatened by use of privacyTenhanced security
• Unilateral(use leads to loss on(control (nonTusable security)
• Multilateral(control(by(secondary(use(of(personal(security(information((reTuse)
• Decentralized(usage(control(supports(usable(security(by(decreasing(individual(risk
V.2Conclusion
Dr.(Sven(Wohlgemuth Resilience(by(Usable(Security 40
Usable(security(is(informational(self+determination(and(supports(resilience
Accountability
Unobservability
Decentralized4
usage4control
Control4by4
transparency
Anonymity
Pseudonymity
Traceability
Personal3
information
Personal3
information
Privacy
Privacy

More Related Content

Similar to Resilience by Usable Security

Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
Research Data Alliance
 
Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
Research Data Alliance
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
Ulrik Lyngs
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitons
Denis Havlik
 
Type-based Dependency Analysis for JavaScript
Type-based Dependency Analysis for JavaScriptType-based Dependency Analysis for JavaScript
Type-based Dependency Analysis for JavaScript
Matthias Keil
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
Denys A. Flores, PhD
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
ssuser50a5ec
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
78201919
7820191978201919
78201919
IJRAT
 
78201919
7820191978201919
78201919
IJRAT
 
Everything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataEverything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic Data
MOSTLY AI
 
2015 genome-center
2015 genome-center2015 genome-center
2015 genome-center
c.titus.brown
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
dmontaner at cipf_2014
dmontaner at cipf_2014dmontaner at cipf_2014
dmontaner at cipf_2014
David Montaner
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
Mukalele Rogers
 
Practical Security Automation
Practical Security AutomationPractical Security Automation
Practical Security Automation
Jason Chan
 
Open Government Data - Security Risk or mean for Threat Prevention
Open Government Data - Security Risk or mean for Threat PreventionOpen Government Data - Security Risk or mean for Threat Prevention
Open Government Data - Security Risk or mean for Threat Prevention
Johann Höchtl
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
Nathan Mathis
 
People Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language ProblemPeople Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language Problem
SecurityStudio
 
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series PresentationISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
SecurityStudio
 

Similar to Resilience by Usable Security (20)

Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
 
Reproducibility for IR evaluation
Reproducibility for IR evaluationReproducibility for IR evaluation
Reproducibility for IR evaluation
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
Microlearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitonsMicrolearning in crowdsourcing and crowdtasking applicaitons
Microlearning in crowdsourcing and crowdtasking applicaitons
 
Type-based Dependency Analysis for JavaScript
Type-based Dependency Analysis for JavaScriptType-based Dependency Analysis for JavaScript
Type-based Dependency Analysis for JavaScript
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
78201919
7820191978201919
78201919
 
78201919
7820191978201919
78201919
 
Everything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic DataEverything you always wanted to know about Synthetic Data
Everything you always wanted to know about Synthetic Data
 
2015 genome-center
2015 genome-center2015 genome-center
2015 genome-center
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
dmontaner at cipf_2014
dmontaner at cipf_2014dmontaner at cipf_2014
dmontaner at cipf_2014
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Practical Security Automation
Practical Security AutomationPractical Security Automation
Practical Security Automation
 
Open Government Data - Security Risk or mean for Threat Prevention
Open Government Data - Security Risk or mean for Threat PreventionOpen Government Data - Security Risk or mean for Threat Prevention
Open Government Data - Security Risk or mean for Threat Prevention
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
People Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language ProblemPeople Committed to Solving our Information Security Language Problem
People Committed to Solving our Information Security Language Problem
 
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series PresentationISSA-OC and Webster University Cybersecurity Seminar Series Presentation
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
 

More from Sven Wohlgemuth

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
Sven Wohlgemuth
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
Sven Wohlgemuth
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
Sven Wohlgemuth
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
Sven Wohlgemuth
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
Sven Wohlgemuth
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
Sven Wohlgemuth
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
Sven Wohlgemuth
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
Sven Wohlgemuth
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
Sven Wohlgemuth
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
Sven Wohlgemuth
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
Sven Wohlgemuth
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
Sven Wohlgemuth
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
Sven Wohlgemuth
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
Sven Wohlgemuth
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Sven Wohlgemuth
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
Sven Wohlgemuth
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
Sven Wohlgemuth
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter Identitätsmanager
Sven Wohlgemuth
 

More from Sven Wohlgemuth (20)

A Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity ManagementA Secure Decision-Support Scheme for Self-Sovereign Identity Management
A Secure Decision-Support Scheme for Self-Sovereign Identity Management
 
Competitive Compliance with Blockchain
Competitive Compliance with BlockchainCompetitive Compliance with Blockchain
Competitive Compliance with Blockchain
 
Secure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with BlockchainsSecure Sharing of Design Information with Blockchains
Secure Sharing of Design Information with Blockchains
 
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 個人情報の有効活用を可能にする (Enabling effective use of personal information) 個人情報の有効活用を可能にする (Enabling effective use of personal information)
個人情報の有効活用を可能にする (Enabling effective use of personal information)
 
EN 6.3: 4 Kryptographie
EN 6.3: 4 KryptographieEN 6.3: 4 Kryptographie
EN 6.3: 4 Kryptographie
 
EN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 SicherheitsmodelleEN 6.3: 3 Sicherheitsmodelle
EN 6.3: 3 Sicherheitsmodelle
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
WP14 Workshop "From Data Economy to Secure Logging as a Step towards Transpar...
 
Privacy in e-Health
Privacy in e-HealthPrivacy in e-Health
Privacy in e-Health
 
On Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health RecordsOn Privacy in Medical Services with Electronic Health Records
On Privacy in Medical Services with Electronic Health Records
 
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-SicherheitsmanagementEN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
EN 6.3: 2 IT-Compliance und IT-Sicherheitsmanagement
 
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer DatenschutzEN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
EN 6.3: 1 IT-Sicherheit und Technischer Datenschutz
 
International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009International Workshop on Information Systems for Social Innovation (ISSI) 2009
International Workshop on Information Systems for Social Innovation (ISSI) 2009
 
Durchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in DienstenetzenDurchsetzung von Privacy Policies in Dienstenetzen
Durchsetzung von Privacy Policies in Dienstenetzen
 
Privacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity ManagementPrivacy in Business Processes by User-Centric Identity Management
Privacy in Business Processes by User-Centric Identity Management
 
Privacy in Business Processes by Identity Management
Privacy in Business Processes by Identity ManagementPrivacy in Business Processes by Identity Management
Privacy in Business Processes by Identity Management
 
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und ImplementierungSchlüsselverwaltung - Objektorientierter Entwurf und Implementierung
Schlüsselverwaltung - Objektorientierter Entwurf und Implementierung
 
Sicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten WeltSicherheit in einer vernetzten Welt
Sicherheit in einer vernetzten Welt
 
Solutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and UsabilitySolutions for Coping with Privacy and Usability
Solutions for Coping with Privacy and Usability
 
iManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter IdentitätsmanageriManager - nutzer-zentrierter Identitätsmanager
iManager - nutzer-zentrierter Identitätsmanager
 

Recently uploaded

一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
eudsoh
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Marlon Dumas
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
Timothy Spann
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
Vineet
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
actyx
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
ugydym
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
TeukuEriSyahputra
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
yuvarajkumar334
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
zsafxbf
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
nhutnguyen355078
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
uevausa
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
oaxefes
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 

Recently uploaded (20)

一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
 
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
Discovering Digital Process Twins for What-if Analysis: a Process Mining Appr...
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
 
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
一比一原版斯威本理工大学毕业证(swinburne毕业证)如何办理
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
Template xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptxTemplate xxxxxxxx ssssssssssss Sertifikat.pptx
Template xxxxxxxx ssssssssssss Sertifikat.pptx
 
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCAModule 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
Module 1 ppt BIG DATA ANALYTICS_NOTES FOR MCA
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 
一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理一比一原版莱斯大学毕业证(rice毕业证)如何办理
一比一原版莱斯大学毕业证(rice毕业证)如何办理
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
一比一原版卡尔加里大学毕业证(uc毕业证)如何办理
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 

Resilience by Usable Security