Results 1 to 10 of about 1,336,497 (343)
Vulnerabilities and responsibilities: dealing with monsters in computer security [PDF]
Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive ...
Consoli, L., Pieters, W.
core +13 more sources
Computer security and security technologies [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution. With the development of computer and communication technologies have developed numerous tools to protect files and other information.
Dragan Velickovic, Lazar Stošić
openaire +3 more sources
ABC of computing. Computer security. [PDF]
Jamie Payton, A. J. Asbury
openalex +4 more sources
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen+1 more
openaire +2 more sources
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.+8 more
core +2 more sources
Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities [PDF]
Approximate computing is an advanced computational technique that trades the accuracy of computation results for better utilization of system resources. It has emerged as a new preferable paradigm over traditional computing architectures for many applications where inaccurate results are acceptable.
Weiqiang Liu+5 more
openaire +4 more sources
An Immune Inspired Approach to Anomaly Detection [PDF]
The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success.
Aickelin, Uwe, Twycross, Jamie
core +4 more sources
Computer and Network Security [PDF]
175 pages, 87 figures and 44 ...
Sen, Jaydip+16 more
openaire +3 more sources
Coded Computing for Secure Boolean Computations [PDF]
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
A. Salman Avestimehr, Chien-Sheng Yang
openaire +3 more sources