Results 11 to 20 of about 221,142 (145)
A framework for security requirements engineering [PDF]
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.+3 more
core +1 more source
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources ...
Bolzoni, D., Eck, P.A.T., Su, X.
core +3 more sources
Computing Optimal Security Strategies for Interdependent Assets
Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)
Letchford, Joshua, Vorobeychik, Yevgeniy
openaire +2 more sources
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen+2 more
core +2 more sources
A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements [PDF]
In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited ...
Bolzoni, D., Eck, P.A.T. van, Su, X.
core +9 more sources
Run-time risk management in adaptive ICT systems [PDF]
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay+4 more
core +1 more source
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.+3 more
core +1 more source
Dynamic cyber-incident response [PDF]
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the ...
Clewley, N+3 more
core +1 more source
Do GANs leave artificial fingerprints?
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego+3 more
core +1 more source