Results 301 to 310 of about 5,973,902 (354)
Some of the next articles are maybe not open access.
Measuring Risk: Computer Security Metrics, Automation, and Learning
IEEE Annals of the History of Computing, 2015Risk management is widely seen as the basis for cybersecurity in contemporary organizations, but practitioners continue to dispute its value. This article analyzes debate over computer security risk management in the 1970s and 1980s United States, using ...
R. Slayton
semanticscholar +1 more source
Planning and Integrating Deception into Computer Security Defenses
New Security Paradigms Workshop, 2014Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s.
Mohammed H. Almeshekah, E. Spafford
semanticscholar +1 more source
Security in Pervasive Computing
2008Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources.
Sajal K. Das, Afrand Agah, Mohan Kumar
openaire +1 more source
Computer Security Incident Response Team Development and Evolution
IEEE Security and Privacy, 2014When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs ...
Robin Ruefle+5 more
semanticscholar +1 more source
ACM SIGUCCS Newsletter, 1980
The computing system at any University Computer Center is intended to be used in a manner that is supportive of its educational purposes and conducive to its educational environment. Constituents of the University are able to apply for the right to use the computing facilities and when that right is granted (e.g., when an account number is issued) it ...
openaire +2 more sources
The computing system at any University Computer Center is intended to be used in a manner that is supportive of its educational purposes and conducive to its educational environment. Constituents of the University are able to apply for the right to use the computing facilities and when that right is granted (e.g., when an account number is issued) it ...
openaire +2 more sources
An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
IEEE Security and Privacy, 2014Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The field of organizational psychology can contribute to an understanding of the full range of CSIRT job requirements, which ...
T. Chen+5 more
semanticscholar +1 more source
International Journal of Information Security, 2001
A strong factor in the early development of computers was security --- the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by limiting ...
openaire +2 more sources
A strong factor in the early development of computers was security --- the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by limiting ...
openaire +2 more sources
A Comparison of Commercial and Military Computer Security Policies
IEEE Symposium on Security and Privacy, 1987Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information.
D. Clark, D. Wilson
semanticscholar +1 more source
Conference on Computer and Communications Security, 2013
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of and alter perceptions regarding-computer security.
Tamara Denning+3 more
semanticscholar +1 more source
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of and alter perceptions regarding-computer security.
Tamara Denning+3 more
semanticscholar +1 more source