Results 1 to 10 of about 5,472,936 (378)

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]

open access: yesFront Psychol, 2017
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc   +2 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone   +2 more
openaire   +9 more sources

Using deep learning to solve computer security challenges: a survey [PDF]

open access: yesCybersecurity, 2020
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
doaj   +2 more sources

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

SoK: Explainable Machine Learning for Computer Security Applications [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2022
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem   +6 more
semanticscholar   +1 more source

Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]

open access: yes2024 IEEE Security and Privacy Workshops (SPW), 2023
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang   +5 more
semanticscholar   +1 more source

Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]

open access: yesComputer Science Journal of Moldova, 2022
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy