Results 1 to 10 of about 5,906,159 (403)

Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]

open access: yesFront Psychol, 2017
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc   +2 more sources

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Understanding computer security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the
Etalle, S., Zannone, N.
core   +13 more sources

Using deep learning to solve computer security challenges: a survey [PDF]

open access: yesCybersecurity, 2020
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
doaj   +2 more sources

Design and Testing of a Computer Security Layer for the LIN Bus [PDF]

open access: yesSensors, 2022
Most modern vehicles are connected to the internet via cellular networks for navigation, assistance, etc. via their onboard computer, which can also provide onboard Wi-Fi and Bluetooth services. The main in-vehicle communication buses (CAN, LIN, FlexRay)
Felipe Páez, Héctor Kaschel
doaj   +2 more sources

COMPUTER SECURITY [PDF]

open access: yesHUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special ...
Glīzds, Lauris, Teilāns, Artis
core   +5 more sources

Computer Security: Competing Concepts [PDF]

open access: greenarXiv, 2001
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum   +2 more
arxiv   +3 more sources

Computer Security

open access: goldCalifornian Journal of Health Promotion, 2005
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex   +3 more sources

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy