Results 1 to 10 of about 1,336,497 (343)

Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]

open access: yesFrontiers in ICT, 2009
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core   +13 more sources

Computer security and security technologies [PDF]

open access: yesJournal of Process Management. New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire   +3 more sources

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

Towards operational measures of computer security [PDF]

open access: yes, 1993
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.   +8 more
core   +2 more sources

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]

open access: yesProceedings of the IEEE, 2020
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu   +5 more
openaire   +4 more sources

An Immune Inspired Approach to Anomaly Detection [PDF]

open access: yes, 2007
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core   +4 more sources

Computer and Network Security [PDF]

open access: yes, 2020
175 pages, 87 figures and 44 ...
Sen, Jaydip   +16 more
openaire   +3 more sources

Coded Computing for Secure Boolean Computations [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
A. Salman Avestimehr, Chien-Sheng Yang
openaire   +3 more sources

Home - About - Disclaimer - Privacy