Results 11 to 20 of about 922,831 (255)
Treatment planning with a 2.5 MV photon beam for radiation therapy
Abstract Purpose The shallow depth of maximum dose and higher dose fall‐off gradient of a 2.5 MV beam along the central axis that is available for imaging on linear accelerators is investigated for treatment of shallow tumors and sparing the organs at risk (OARs) beyond it.
Navid Khaledi+5 more
wiley +1 more source
The management of information security: A South African case study
The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management,
L. C.H. Fourie
doaj +1 more source
Integrating security and usability into the requirements and design process [PDF]
According to Ross Anderson, 'Many systems fail because their designers protect the wrong things or protect the right things in the wrong way'. Surveys also show that security incidents in industry are rising, which highlights the difficulty of designing ...
Flechais, I, Mascolo, C, Sasse, MA
core +2 more sources
A framework for security requirements engineering [PDF]
This paper presents a framework for security requirements elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals based on
Haley, Charles B.+3 more
core +1 more source
Introduction: considering the information threats and the need to procedures for develop and improve security and confidentiality, international standard organization (ISO) established information security standard ISO/IEC 27001.
Rouhollah Sheikh Abumasoudi+3 more
doaj +1 more source
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services [PDF]
In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources ...
Bolzoni, D., Eck, P.A.T., Su, X.
core +3 more sources
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj
Dynamic cyber-incident response [PDF]
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the ...
Clewley, N+3 more
core +1 more source
A One-Factor Conditionally Linear Commodity Pricing Model under Partial Information [PDF]
A one-factor asset pricing model with an Ornstein--Uhlenbeck process as its state variable is studied under partial information: the mean-reverting level and the mean-reverting speed parameters are modeled as hidden/unobservable stochastic variables.
arxiv +1 more source
Run-time risk management in adaptive ICT systems [PDF]
We will present results of the SERSCIS project related to risk management and mitigation strategies in adaptive multi-stakeholder ICT systems.
Chakravarthy, Ajay+4 more
core +1 more source