Results 11 to 20 of about 221,142 (145)

A framework for security requirements engineering [PDF]

open access: yes, 2006
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.   +3 more
core   +1 more source

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj  

Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services [PDF]

open access: yes, 2006
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources ...
Bolzoni, D., Eck, P.A.T., Su, X.
core   +3 more sources

Computing Optimal Security Strategies for Interdependent Assets

open access: yes, 2012
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Letchford, Joshua, Vorobeychik, Yevgeniy
openaire   +2 more sources

How does intellectual capital align with cyber security? [PDF]

open access: yes, 2019
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen   +2 more
core   +2 more sources

A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]

open access: yes, 2006
In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited ...
Bolzoni, D., Eck, P.A.T. van, Su, X.
core   +9 more sources

Run-time risk management in adaptive ICT systems [PDF]

open access: yes, 2013
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay   +4 more
core   +1 more source

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]

open access: yes, 2020
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.   +3 more
core   +1 more source

Dynamic cyber-incident response [PDF]

open access: yes, 2014
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the ...
Clewley, N   +3 more
core   +1 more source

Do GANs leave artificial fingerprints?

open access: yes, 2018
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy