Results 1 to 10 of about 5,949,154 (313)

Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]

open access: yesFront Psychol, 2017
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc   +2 more sources

Computer Security

open access: yesIssues in Science and Technology Librarianship, 2002
This guide is intended to present a selected list of sites that cover the basic issues of computer security and which provide useful information for the non-expert (librarian, undergraduate student, office manager, etc.) who wants to learn more about ...
Jane F. Kinkus
doaj   +3 more sources

COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]

open access: yesJournal of Process Management and New Technologies, 2013
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj   +3 more sources

Understanding Computer Security [PDF]

open access: yesFrontiers in ICT, 2014
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Etalle, Sandro, Zannone, Nicola
openaire   +8 more sources

Using deep learning to solve computer security challenges: a survey [PDF]

open access: yesCybersecurity, 2020
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi   +7 more
doaj   +2 more sources

COMPUTER SECURITY

open access: yesHUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
semanticscholar   +4 more sources

Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]

open access: yesUSENIX Security Symposium, 2023
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar   +1 more source

SoK: Explainable Machine Learning for Computer Security Applications [PDF]

open access: yesEuropean Symposium on Security and Privacy, 2022
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem   +6 more
semanticscholar   +1 more source

UNSW‐NB15 computer security dataset: Analysis through visualization [PDF]

open access: yesSecurity and Privacy, 2021
Class imbalance refers to a major issue in data mining where data with unequal class distribution can deteriorate classification performance. Although it alone affects the performance of the classifiers, the joint‐effect of class imbalance and overlap is
Zeinab Zoghi, G. Serpen
semanticscholar   +1 more source

Federated Secure Computing

open access: yesInformatics, 2023
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy