Results 1 to 10 of about 5,472,936 (378)
COMPUTER SECURITY AND SECURITY TECHNOLOGIES [PDF]
With the increasing development of computer and communications technology growth and increasing needs and development of information systems security. The problem of security must be approached with greater caution.
Lazar Stošić, Dragan Veličković
doaj +3 more sources
Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc +2 more sources
Understanding Computer Security [PDF]
Few things in society and everyday life have changed in the last 10 years as much as the concept of security. From bank robberies to wars, what used to imply a great deal of violence is now silently happening on the Internet. Perhaps more strikingly, the very idea of privacy – a concept closely related to that of individual freedom – is undergoing such
Nicola Zannone+2 more
openaire +9 more sources
Using deep learning to solve computer security challenges: a survey [PDF]
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi+7 more
doaj +2 more sources
ABC of computing. Computer security. [PDF]
Jamie Payton, A. J. Asbury
openalex +4 more sources
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home.
Edward A. Schmalz
openalex +3 more sources
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar +1 more source
SoK: Explainable Machine Learning for Computer Security Applications [PDF]
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem+6 more
semanticscholar +1 more source
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang+5 more
semanticscholar +1 more source
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure [PDF]
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements.
Ferucio Laurentiu Tiplea+2 more
doaj +1 more source