Results 1 to 10 of about 5,906,159 (403)
Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]
Front Psychol, 2017Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc +2 more sources
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
Journal of Process Management and New Technologies, 2013With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj +3 more sources
Understanding computer security [PDF]
Frontiers in ICT, 2014Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the
Etalle, S., Zannone, N.
core +13 more sources
Using deep learning to solve computer security challenges: a survey [PDF]
Cybersecurity, 2020Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi+7 more
doaj +2 more sources
Design and Testing of a Computer Security Layer for the LIN Bus [PDF]
Sensors, 2022Most modern vehicles are connected to the internet via cellular networks for navigation, assistance, etc. via their onboard computer, which can also provide onboard Wi-Fi and Bluetooth services. The main in-vehicle communication buses (CAN, LIN, FlexRay)
Felipe Páez, Héctor Kaschel
doaj +2 more sources
HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special ...
Glīzds, Lauris, Teilāns, Artis
core +5 more sources
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special ...
Glīzds, Lauris, Teilāns, Artis
core +5 more sources
Computer Security: Competing Concepts [PDF]
arXiv, 2001This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum+2 more
arxiv +3 more sources
ABC of computing. Computer security. [PDF]
BMJ, 1983Jamie Payton, A. J. Asbury
openalex +4 more sources
Californian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]
USENIX Security Symposium, 2023The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar +1 more source