Results 291 to 300 of about 5,973,902 (354)

Molecular Domino Toppling for Directed Self‐Erasing Information Transfer

open access: yesAdvanced Materials, EarlyView.
An azobenzene‐based material with unprecedented light‐pumped directional charge‐transfer reminiscent of toppling dominoes is presented. After light‐induced trans→cis forward isomerization, electron hopping occurs in a sequential and propagating manner between the cis isomers along with an electrocatalytic cis→trans backward isomerization.
Ying Li   +7 more
wiley   +1 more source

Computer Security

Firewalls Don't Stop Dragons, 2018
Carey Parker
semanticscholar   +3 more sources

Computer security [PDF]

open access: possibleACM SIGMIS Database: the DATABASE for Advances in Information Systems, 1972
With the growing requirements for protection generated by legislation such as the 1974 Privacy Act, the increasing complexity of computer and data communications applications, and increasing awareness regarding computer vulnerabilities, the discipline of computer security is achieving independent recognition.
openaire   +3 more sources

Deception Techniques in Computer Security

ACM Computing Surveys, 2018
A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection.
Xiao Han, Nizar Kheir, D. Balzarotti
semanticscholar   +1 more source

Habituation effects in computer security warning

Information Security Journal, 2018
Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function
Ammar Amran, Z. Zaaba, M. Singh
semanticscholar   +1 more source

Computer security

IEEE Security & Privacy Magazine, 2004
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information.
J.A. Whittaker, M. Andrews
openaire   +2 more sources

Computer security

WIREs Computational Statistics, 2010
AbstractComputer security encompasses concepts and methods for protecting sensitive resources in computer systems. Computer security starts from the policies that regulate access to protected resources. In technology, the focus is on mechanisms for enforcing these policies.
openaire   +2 more sources

Computing the value of security

IEE Proceedings - Generation, Transmission and Distribution, 2002
Power systems are operated with some margin of security to ensure that the most likely losses of plant will not cause interruptions to supply. However, this security margin has a cost that may not be justified by the benefit in terms of prevention of lost load.
Kirschen, D.   +4 more
openaire   +5 more sources

Security for Ubiquitous Computing

2008
Taking typical ubiquitous computing settings as a starting point, this chapter motivates the need for security. The reader will learn what makes security challenging and what the risks predominant in ubiquitous computing are. The major part of this chapter is dedicated to the description of sample solutions in order to illustrate the wealth of ...
Tobias Straub, Andreas Heinemann
openaire   +2 more sources

Cloud Computing Security [PDF]

open access: possibleInternational Journal of Ambient Computing and Intelligence, 2011
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire   +1 more source

Home - About - Disclaimer - Privacy