Results 1 to 10 of about 373,921 (174)
Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution
In this new era of science and technology, data can be said to be an extremely valuable asset for individuals, corporations, and even countries. Different parties attempt to obtain users' data occasionally, and the collection of web cookies is a ...
Yi Hong Tay +4 more
semanticscholar +1 more source
Real Estate Security using Blockchain
Property is an important asset, and the use of blockchain technology can help improve the implementation of work in this sector as well as its characteristics significantly for a smooth and trouble-free work flow to achieve a reliable system.
R. C. Suryawanshi +3 more
semanticscholar +1 more source
Threats in Software CPS and Potential Security Solutions
The concept of cybernetics, microelectronics, design, and process science are all intertwined in CPS. Embedded systems are often used to describe process control. While a strong connection between the physical and computational aspects is still important
heanyi Emeka Ukamaka, Agada Martina
semanticscholar +1 more source
The management of information security: A South African case study
The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management,
L. C.H. Fourie
doaj +1 more source
Impact Assessment for Cyber Security Situation Awareness [PDF]
Cyber security situation awareness is important for the analysis of cyberspace, and detection of ever-changing threats. As computer networks and systems continue to increase in complexity and sophistication, the requirements and on a cybersecurity ...
Sina FarahaniNia +3 more
doaj
Integrating security and usability into the requirements and design process [PDF]
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core +1 more source
Our research started a long ago as additional security for the asset owner to facilitate CIPS ( Cross-border Interbank Payment System) holistic security.
A. Zisopoulos +3 more
semanticscholar +1 more source
Balancing Usability and Protection: A Decision-Making Approach to Computer Network Security Evaluation using the Neutrosophic Fuzzy Dombi Operator [PDF]
In an era where data is a vital organizational asset, the challenge of safeguarding digital infrastructure while maintaining system usability has become increasingly complex.
Meijing Zhang, Linghui Li
doaj +1 more source
A framework for security requirements engineering [PDF]
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B. +3 more
core +1 more source
Asset Management Security System Using RFID Technology
Using radio wave or radio frequency scanners to identify wirelessly any object is not so much complex in reality. The latest version of this technology is known as radio frequency identification or RFID.
Soumyasanta Rakshit, Dr. S. S. Sridhar
semanticscholar +1 more source

