Results 291 to 300 of about 4,301,094 (348)
Some of the next articles are maybe not open access.
Asleep at the Keyboard? Assessing the Security of GitHub Copilot’s Code Contributions
IEEE Symposium on Security and Privacy, 2021There is burgeoning interest in designing AI-based systems to assist humans in designing computing systems, including tools that automatically generate computer code.
H. Pearce+4 more
semanticscholar +1 more source
IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
J.A. Whittaker, M. Andrews
openaire +2 more sources
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
J.A. Whittaker, M. Andrews
openaire +2 more sources
International Journal of Information Security, 2001
Summary: A strong factor in the early development of computers was security -- the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by ...
openaire +3 more sources
Summary: A strong factor in the early development of computers was security -- the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by ...
openaire +3 more sources
HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, 2017
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +2 more sources
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Glīzds, Lauris, Teilāns, Artis
openaire +2 more sources
Computing the value of security
IEE Proceedings - Generation, Transmission and Distribution, 2002Power systems are operated with some margin of security to ensure that the most likely losses of plant will not cause interruptions to supply. However, this security margin has a cost that may not be justified by the benefit in terms of prevention of lost load.
Kirschen, D.+4 more
openaire +5 more sources
WIREs Computational Statistics, 2010
AbstractComputer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies.
openaire +2 more sources
AbstractComputer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies.
openaire +2 more sources
Security for Ubiquitous Computing
2008Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of ...
Tobias Straub, Andreas Heinemann
openaire +2 more sources
Cloud Computing Security [PDF]
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire +1 more source
ACM SIGUCCS Newsletter, 1980
The computing system at any University Computer Center is intended to be used in a manner that is supportive of its educational purposes and conducive to its educational environment. Constituents of the University are able to apply for the right to use the computing facilities and when that right is granted (e.g., when an account number is issued) it ...
openaire +2 more sources
The computing system at any University Computer Center is intended to be used in a manner that is supportive of its educational purposes and conducive to its educational environment. Constituents of the University are able to apply for the right to use the computing facilities and when that right is granted (e.g., when an account number is issued) it ...
openaire +2 more sources
Security in Pervasive Computing
2008Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources.
Sajal K. Das, Afrand Agah, Mohan Kumar
openaire +1 more source