Results 301 to 310 of about 5,973,902 (354)
Some of the next articles are maybe not open access.

Measuring Risk: Computer Security Metrics, Automation, and Learning

IEEE Annals of the History of Computing, 2015
Risk management is widely seen as the basis for cybersecurity in contemporary organizations, but practitioners continue to dispute its value. This article analyzes debate over computer security risk management in the 1970s and 1980s United States, using ...
R. Slayton
semanticscholar   +1 more source

Planning and Integrating Deception into Computer Security Defenses

New Security Paradigms Workshop, 2014
Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s.
Mohammed H. Almeshekah, E. Spafford
semanticscholar   +1 more source

Security in Pervasive Computing

2008
Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the user and the infrastructure, the mobility of the user, and dynamic sharing of limited resources.
Sajal K. Das, Afrand Agah, Mohan Kumar
openaire   +1 more source

Computer Security Incident Response Team Development and Evolution

IEEE Security and Privacy, 2014
When computer security incidents occur, it's critical that organizations be able to handle them in a timely manner. The speed with which an organization can recognize, analyze, and respond to an incident will affect the damage and lower recovery costs ...
Robin Ruefle   +5 more
semanticscholar   +1 more source

Computer security

ACM SIGUCCS Newsletter, 1980
The computing system at any University Computer Center is intended to be used in a manner that is supportive of its educational purposes and conducive to its educational environment. Constituents of the University are able to apply for the right to use the computing facilities and when that right is granted (e.g., when an account number is issued) it ...
openaire   +2 more sources

An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams

IEEE Security and Privacy, 2014
Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The field of organizational psychology can contribute to an understanding of the full range of CSIRT job requirements, which ...
T. Chen   +5 more
semanticscholar   +1 more source

Computer security

International Journal of Information Security, 2001
A strong factor in the early development of computers was security --- the computations that motivated their development, such as decrypting intercepted messages, generating gunnery tables, and developing weapons, had military applications. But the computers themselves were so big and so few that they were relatively easy to protect simply by limiting ...
openaire   +2 more sources

A Comparison of Commercial and Military Computer Security Policies

IEEE Symposium on Security and Privacy, 1987
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to provide control of classified information.
D. Clark, D. Wilson
semanticscholar   +1 more source

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education

Conference on Computer and Communications Security, 2013
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop card game created to raise awareness of and alter perceptions regarding-computer security.
Tamara Denning   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy