Printer Friendly

Browse Security management topic

Methods subtopic

Articles

1-263 out of 263 article(s)
Title Author Type Date Words
Ring expert on how to avoid common home security mistakes. Jul 7, 2019 839
United States : Learn How to Defeat Advanced Adversaries at SANS San Jose Cyber Security Training Event. Jun 1, 2019 338
Advanced insider threat detection model to apply periodic work atmosphere. Oh, Junhyoung; Kim, Tae Ho; Lee, Kyung Ho Report Mar 1, 2019 5510
From Preparation to Implementation: How to Fully Adopt Automation in 2019. Schreiber, Joe Mar 1, 2019 598
A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments. Choi, Seul-Ki; Lee, Taejin; Kwak, Jin Case study Mar 1, 2019 4178
Nine Ways to Safeguard Privileged User Accounts and Protect Your Kingdom. Muralidharan, Anusha K. Dec 1, 2018 1124
State of the Art Intrusion Detection System for Cloud Computing. Ahmad, Azuan; Zainudin, Wan Shafiuddin; Kama, Mohd Nazri; Idris, Norbik Bashah; Saudi, Madihah Mohd; Report Dec 1, 2018 11606
Advanced approach to information security management system utilizing maturity models in critical infrastructure. You, Youngin; Oh, Junhyoung; Kim, Sooheon; Lee, Kyungho Report Oct 1, 2018 8834
Efficient Trajectory Data Privacy Protection Scheme Based on Laplace's Differential Privacy. Gut, Ke; Yang, Lihao; Liu, Yongzhi; Yin, Bo Report Sep 1, 2018 6803
Implementation and Analysis of Combined Machine Learning Method for Intrusion Detection System. Wahyudi, Bisyron; Ramli, Kalamullah; Murfi, Hendri Report Aug 1, 2018 7562
Securing loT Devices Post-Deployment: By the very way they were manufactured, Internet of Things devices are at risk for cyberattacks. Figuring out how to prevent these threats often requires a multilayered approach. Gutman, Yotam Jul 1, 2018 1195
How Our Institution Went From Most Hacked to Zero Breaches. Denzer, Juan Jun 1, 2018 2429
What Do They Know, and When Did They Know It? West, Jessamyn Jun 1, 2018 1198
Get a Handle on Network Security: School districts can boost network security using the micro-segmentation capabilities of VMware NSX. May 1, 2018 538
Persistent digital piracy calls for new approaches to content security: Piracy, an illegal act of content distribution prior to release, is one struggle that media companies have been combating against since the advent of the Internet. And in the current converged landscape between linear TV and online video, media operators are finding it necessary to introduce new security measures as a way to safeguard revenues. Tan, Josephine Apr 1, 2018 1747
Utilization of Statistical Control Charts for DoS Network Intrusion Detection. Sklavounos, Dimitris; Edoh, Aloysius; Paraskevopoulos, George Report Apr 1, 2018 4874
2 Estonia: The Potential Modes and Venues of Russian Aggression. Giles, Keir Report Mar 1, 2018 3889
Structure and Challenges of a Security Policy on Small and Medium Enterprises. Almeida, Fernando; Carvalho, Ines; Cruz, Fabio Report Feb 1, 2018 7294
System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats. Choi, Seul-Ki; Yang, Chung-Huang; Kwak, Jin Report Feb 1, 2018 3649
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. Li, Wei; Liao, Linfeng; Gu, Dawu; Ge, Chenyu; Gao, Zhiyong; Zhou, Zhihong; Guo, Zheng; Liu, Ya; Liu, Report Jan 1, 2018 9123
A New Method of Image Steganography Using 7th Bit of a Pixel as Indicator by Introducing the Successive Temporary Pixel in the Gray Scale Image. Joshi, Kamaldeep; Gill, Swati; Yadav, Rajkumar Jan 1, 2018 4680
New Insights into Approaches to Evaluating Intention and Path for Network Multistep Attacks. Hu, Hao; Liu, Yuling; Yang, Yingjie; Zhang, Hongqi; Zhang, Yuchen Jan 1, 2018 9041
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Jaidi, Faouzi; Ayachi, Faten Labbene; Bouhoula, Adel Jan 1, 2018 11242
Revealing Influenced Selected Feature for P2P Botnet Detection. Wan, Ahmad Ramzi W.Y.; Faizal M.A.; Rudy, Fadhlee M.D.; Nur, Hidayah M.S. Report Dec 1, 2017 5969
Preserving Confidentiality and Privacy of Sensitive Data in e-Procurement System. Narang, Rajesh; Narang, Tanmay Report Oct 1, 2017 4568
PM directs for optimal methods to ensure food security. Sep 6, 2017 335
Fuzzy Preferences based STRIDE Threat Model for Network Intrusion Detection. Khan, Salman A. Report Sep 1, 2017 2679
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. Sun, Bangyi; Chu, Jianfeng; Hu, Liang; Li, Hongtu; Shi, Guangkun Report Sep 1, 2017 5891
Detection of illegal traffic pattern using hybrid improved CART and multiple extreme learning machine approach. Lekha, J.; Ganapathi, Padmavathi Report Aug 1, 2017 4720
Black hole attack detection using fuzzy based IDS. Abdel-Azim, Mohammed; Salah, Hossam El-Din; Ibrahim, Menas Report Aug 1, 2017 6042
Ares Privacy Protector Granted the Patent of "Digital Document Locating Method". Jun 30, 2017 581
Vulnerable path attack and its detection. Tong, Ying; Shen, Yuehong; Gao, Bin; Sun, Fenggang; Chen, Rui; Xu, Yefeng Report Apr 1, 2017 8080
Provably-secure public auditing with deduplication. Kim, Dongmin; Jeong, Ik Rae Report Apr 1, 2017 8438
The Communication Error Message: Managing Best Practice Ideas and the Cyber Threat. A Precursor to Communication Themes. Boyd, Robert D. Report Apr 1, 2017 4546
A Novel Framework for Secure E-Commerce Transactions. Mlelwa, Kenneth L.; Yonah, Zaipuna O. Report Apr 1, 2017 3874
DTCF: A distributed trust computing framework for vehicular ad hoc networks. Gazdar, Tahani; Belghith, Abdelfettah; AlMogren, Ahmad Report Mar 1, 2017 11362
Lightweight intrusion detection of rootkit with VMI-based driver separation mechanism. Cui, Chaoyuan; Wu, Yun; Li, Yonggang; Sun, Bingyu Report Mar 1, 2017 8170
How to corral sensitive enterprise data: without locking it away from users. Hampton, Paul Feb 1, 2017 717
Cyber security, threat intelligence: Defending the digital platform. Opara, Emmanuel U.; Hussein, Mohammed T. Report Jan 1, 2017 4211
A STRIDE Model based Threat Modelling using Unified and-Or Fuzzy Operator for Computer Network Security. Khan, Salman A. Report Jan 1, 2017 5055
The small district challenge: smaller schools and districts face some unique challenges when it comes to defending against ransomware. Jan 1, 2017 653
CHAOS: An SDN-Based Moving Target Defense System. Shi, Yuan; Zhang, Huanguo; Wang, Juan; Xiao, Feng; Huang, Jianwei; Zha, Daochen; Hu, Hongxin; Yan, F Report Jan 1, 2017 7469
Low-Rate DDoS Attack Detection Using Expectation of Packet Size. Zhou, Lu; Liao, Mingchao; Yuan, Cao; Zhang, Haoyu Report Jan 1, 2017 9489
A Survey on Secure Wireless Body Area Networks. Zou, Shihong; Xu, Yanhong; Wang, Honggang; Li, Zhouzhou; Chen, Shanzhi; Hu, Bo Report Jan 1, 2017 5354
Research on the Effectiveness Evaluation Model of the Prison Physical Protection System Based on Grey Analytic Hierarchy Process. Yin, Ke Report Jan 1, 2017 5837
A Fusion of Multiagent Functionalities for Effective Intrusion Detection System. Sadhasivan, Dhanalakshmi Krishnan; Balasubramanian, Kannapiran Report Jan 1, 2017 8573
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. Andrysiak, Tomasz; Saganowski, Aukasz; Kiedrowski, Piotr Report Jan 1, 2017 14587
Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems. Zhao, Ju-min; Feng, Ding; Li, Deng-ao; Gong, Wei; Liu, Hao-xiang; Huo, Shi- min Report Jan 1, 2017 7309
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Zhou, Caixue; Zhao, Zhiqiang; Zhou, Wan; Mei, Yuan Report Jan 1, 2017 15158
Stackelberg Interdependent Security Game in Distributed and Hierarchical Cyber-Physical Systems. Shen, Jiajun; Feng, Dongqin Report Jan 1, 2017 12712
Towards Large-Scale, Heterogeneous Anomaly Detection Systems in Industrial Networks: A Survey of Current Trends. Iturbe, Mikel; Garitano, Inaki; Zurutuza, Urko; Uribeetxeberria, Roberto Report Jan 1, 2017 13811
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. Liu, Yi; Zhang, Hong-qi; Liu, Jiang; Yang, Ying-jie Report Jan 1, 2017 12555
F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems. Wang, Jingxuan; Hui, Lucas C.K.; Yiu, S.M.; Zhou, Gang; Zhang, Ruoqing Report Jan 1, 2017 6760
A Systematic Review of Security Mechanisms for Big Data in Health and New Alternatives for Hospitals. Hamrioui, Sofiane; de la Torre Diez, Isabel; Garcia-Zapirain, Begonya; Saleem, Kashif; Rodrigues, Jo Report Jan 1, 2017 4666
An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks. Zhao, Zheng; Liu, Fenlin; Gong, Daofu Report Jan 1, 2017 8542
Remotely Exploiting AT Command Attacks on ZigBee Networks. Vaccari, Ivan; Cambiaso, Enrico; Aiello, Maurizio Report Jan 1, 2017 6949
Performance Evaluation of Cryptographic Algorithms over IoT Platforms and Operating Systems. Pereira, Geovandro C.C.F.; Alves, Renan C.A.; da Silva, Felipe L.; Azevedo, Roberto M.; Albertini, B Report Jan 1, 2017 10469
A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives. Vorakulpipat, Chalee; Sirapaisan, Soontorn; Rattanalerdnusorn, Ekkachan; Savangsuk, Visut Report Jan 1, 2017 8771
Identification of ICS Security Risks toward the Analysis of Packet Interaction Characteristics Using State Sequence Matching Based on SF-FSM. Xu, Jianxin; Feng, Dongqin Report Jan 1, 2017 10567
The Performance Evaluation of an IEEE 802.11 Network Containing Misbehavior Nodes under Different Backoff Algorithms. Hoang, Trong-Minh; Bui, Van-Kien; Nguyen, Thanh-Tra Report Jan 1, 2017 3865
Should libraries even consider hacking back if attacked? Seriously considering all future legal options is part of a good offence. Smith, Felicia A. Jan 1, 2017 1962
Security analysis of the Whirlpool Hash Function in the cloud of things. Li, Wei; Gao, Zhiyong; Gu, Dawu; Ge, Chenyu; Liao, Linfeng; Zhou, Zhihong; Liu, Ya; Liu, Zhiqiang Report Jan 1, 2017 6507
Schools learn their lessons on ransomware: several schools have already been hit with ransomware, so be ready. Jan 1, 2017 618
Can you trust the cloud? Best practices to secure your personal data. Hennig, Nicole Nov 1, 2016 2792
A privacy-preserving health data aggregation scheme. Liu, Yining; Liu, Gao; Cheng, Chi; Xia, Zhe; Shen, Jian Report Aug 1, 2016 5832
An anomaly detection framework based on ICA and Bayesian classification for IaaS platforms. Wang, GuiPing; Yang, Jian Xi; Li, Ren Report Aug 1, 2016 8689
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload. Kakavand, Mohsen; Mustapha, Norwati; Mustapha, Aida; Abdullah, Mohd Taufik Report Aug 1, 2016 10861
Proposal and evaluation of method for establishing consensus on combination of measures based on Cybersecurity Framework. Fukushima, Shota; Sasaki, Ryoichi Report Jul 1, 2016 4759
High security and flexible privacy for library services. Breeding, Marshall Jun 1, 2016 2406
Cybersecurity as an extension of privacy in libraries. West, Jessamyn Jun 1, 2016 1194
Design of face recognition based embedded home security system. Sahani, Mrutyunjanya; Subudhi, Subhashree; Mohanty, Mihir Narayan Report Apr 1, 2016 4526
Cryptographically-generated virtual credit card number for secure Card-Not-Present transactions. Park, Chan-Ho; Park, Chang-Seop Report Apr 1, 2016 6463
Detection and parameter estimation for jitterbug covert channel based on coefficient of variation. Wang, Hao; Liu, Guangjie; Zhai, Jiangtao; Dai, Yuewei Report Apr 1, 2016 6857
How to improve database security. Mullins, Craig S. Apr 1, 2016 765
Performance measures for evaluating the dynamic authentication techniques. Liou, Jing-Chiou Report Apr 1, 2016 5734
The reality and response of cyber threats to critical infrastructure: a case study of the cyber-terror attack on the Korea Hydro & Nuclear Power Co., Ltd. Lee, Kyung-bok; Lim, Jong-in Case study Feb 1, 2016 11679
Defense strategy of network security based on dynamic classification. Wei, Jinxia; Zhang, Ru; Liu, Jianyi; Niu, Xinxin; Yang, Yixian Report Dec 1, 2015 6937
New approach for detecting leakage of internal information; using emotional recognition technology. Lee, Ho-Jae; Park, Min-Woo; Eom, Jung-Ho; Chung, Tai-Myoung Report Nov 1, 2015 6104
Robust cooperative relay beamforming design for security. Gong, Xiangwu; Dong, Feihong; Li, Hongjun; Shao, Wei Report Nov 1, 2015 6777
The seven deadly sins of incident response. Tansey, Brandon Nov 1, 2015 1562
Adoption of modern methods perquisite to ensure food security. Oct 9, 2015 118
Supplementary event-listener injection attack in smart phones. Hidhaya, S. Fouzul; Geetha, Angelina; Kumar, B. Nandha; Sravanth, Loganathan Venkat; Habeeb, A. Report Oct 1, 2015 4658
Mobile app installation: the role of precautions and desensitization. Harris, Mark A.; Chin, Amita Goyal; Brookshire, Robert Report Oct 1, 2015 7041
Multimedia implementations for SOHO networks and their security issues: Opening Pandora's box with Sonos and SonosNet. Kavalaris, Stylianos; Serrelis, Emmanouil Report Jul 1, 2015 7564
With attacks on the rise, how can SCADA security be improved? Galea, Deborah Jun 1, 2015 660
Hacked! Lessons learned from an URL injection. Ajmi, Ayyoub Jun 1, 2015 2229
Security in a sharing profession. West, Jessamyn Jun 1, 2015 1151
A strategic analysis of information sharing among cyber hackers. Hausken, Kjell Report May 1, 2015 11419
What's the point of the security of the European union? Institutional developments and regional strategies reaching military autonomy. Avram, Cezar Essay Jan 1, 2015 5095
A framework for effectiveness of cyber security defenses, a case of the United Arab Emirates (UAE). Neaimi, Abdulla Al; Ranginya, Tago; Lutaaya, Philip Case study Jan 1, 2015 5763
An assessment of corporate security policy violations using live forensics analysis. Yeboah-Boateng, Ezer Osei; Boadi, Eric Bonnah Report Jan 1, 2015 5537
BYOD network: enhancing security through trust--aided access control mechanisms. Nwebonyi, Francis Nwebonyi; Daniel Ani, Uchenna P. Report Jan 1, 2015 9993
Mitigating external threats in wireless local area networks. Olufon, Tope; Campbell, Carlene E.-A.; Hole, Stephen; Radhakrishnan, Kapilan; Sedigh, Arya Report Dec 1, 2014 7749
A fuzzy logic based defense mechanism against distributed denial of service attack in cloud computing environment. Iyengar, N. Ch. S.N.; Banerjee, Arindam; Ganapathy, Gopinath Report Dec 1, 2014 10026
Defending HTTP web servers against DDoS attacks through busy period-based attack flow detection. Nam, Seung Yeob; Djuraev, Sirojiddin Report Jul 1, 2014 9183
Gov't explores new ways to ensure food security. May 24, 2014 296
How to survive a cyberattack: here's how a North Carolina district responded to a denial-of-service attack that came from one of its own schools. Hardin, Phil May 1, 2014 1311
The role of human factors in information system security. safari, Leila; Rahmati, Azizallah Report May 1, 2014 3203
Comprehensive solution to mitigate the cyber-attacks in cloud computing. Singh, Jitendra Report Apr 1, 2014 3532
Practical swarm optimization based fault-tolerance algorithm for the internet of things. Luo, Shiliang; Cheng, Lianglun; Ren, Bin Report Apr 1, 2014 4820
An indirect security trust method based on credibility evaluation. Xianghe, Wei; Hong, Zhang; Zhen, Liu; Qianmu, Li; Bin, Xia Report Apr 1, 2014 6721
Key updating methods for combinatorial design based key management schemes. Xu, Chonghuan; Liu, Weinan Jan 1, 2014 6903
Advanced approach to information security management system model for industrial control system. Park, Sanghyun; Lee, Kyungho Report Jan 1, 2014 5321
Covert network analysis for key player detection and event prediction using a hybrid classifier. Butt, Wasi Haider; Akram, M. Usman; Khan, Shoab A.; Javed, Muhammad Younus Report Jan 1, 2014 7848
Detection and protection against intrusions on smart grid systems. Arvani, Ata; Rao, Vittal S. Report Jan 1, 2014 5594
CC-case as an integrated method of security analysis and assurance over life-cycle process. Kaneko, Tomoko; Yamamoto, Shuichiro; Tanaka, Hidehiko Report Jan 1, 2014 4705
Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors. Nagunwa, Thomas Report Jan 1, 2014 6323
A study on the security algorithm for contexts in smart cities. Ko, Hoon; Bae, Kitae; Kim, Sang Heon; An, Kyung Jin Report Jan 1, 2014 4930
Dynamic access control model for security client services in smart grid. Yeo, Sang-Soo; Kim, Si-Jung; Cho, Do-Eun Report Jan 1, 2014 4251
Secure model against apt in m-connected SCADA network. Kim, Si-Jung; Cho, Do-Eun; Yeo, Sang-Soo Report Jan 1, 2014 4164
Intelligent surveillance for understanding events in urban traffic environments. Vallejo, D.; Villanueva, F.J.; Albusac, J.A.; Glez-Morcillo, C.; Castro-Schez, J.J. Report Jan 1, 2014 6904
Container security device chain network for safe railway transportation. Kim, Sungryul; Kim, Jeonghyun; Yoo, Younghwan Report Jan 1, 2014 8884
Application of fault-tolerant mechanism to reduce pollution attacks in peer-to-peer networks. Chen, Chien-Sheng; Yeh, Ting-Yuan; Lee, Chin-Tan; Lu, Chyuan-Der Report Jan 1, 2014 12854
IT security: for you an your library. Carver, Blake Jan 1, 2014 2668
DTSTM: Dynamic Tree Style Trust Measurement model for cloud computing. Zhou, Zhen-ji; Wu, Li-fa; Hong, Zheng; Xu, Ming-fei; Pan, Fan Report Jan 1, 2014 9177
An Intrusion Detection System with Home Installation Networks. Mundt, Thomas; Dahn, Andreas; Sass, Stephan Case study Jan 1, 2014 5633
Beefing up security and preventing theft. Poulson, Deborah Brief article Nov 1, 2013 236
A detailed strategy for managing corporation cyber war security. Al-Ahmad, Walid Report Oct 1, 2013 4212
New actors and the state: addressing maritime security threats in Southeast Asia. Liss, Carolin Essay Aug 1, 2013 8623
New constructions of hierarchical attribute-based encryption for fine-grained access control in cloud computing. Zhang, Leyou; Hu, Yupu Report May 1, 2013 5624
The establishment of security strategies for introducing cloud computing. Yoon, Young Bae; Oh, Junseok; Lee, Bong Gyou Report Apr 1, 2013 7808
An improved efficient provable secure identity-based identification scheme in the standard model. Tan, Syh-Yuan; Chin, Ji-Jian; Heng, Swee-Huay; Goi, Bok-Min Report Apr 1, 2013 5870
Use of ontologies in mapping of information security requirements/Ontologijos naudojimas informacijos saugumo reikalavimams susieti. Ramanauskaite, Simona; Radvile, Egle; Olifer, Dmitrij Report Apr 1, 2013 1498
An investigation of features and security in mobile banking strategy. Lee, Huei; Zhang, Yu; Chen, Kuo Lane Report Apr 1, 2013 7424
Is security realistic in cloud computing? Srinivasan, S. Report Apr 1, 2013 8693
Information security assessment of SMEs as coursework--learning information security management by doing. Ilvonen, Ilona Report Mar 22, 2013 6390
Preparing information systems (IS) graduates to meet the challenges of global IT security: some suggestions. Sauls, Jeff; Gudigantala, Naveen Report Mar 22, 2013 1913
Incorporating global information security and assurance in I.S. education. White, Garry L.; Hewitt, Barbara; Kruck, S.E. Report Mar 22, 2013 3763
What if your business is hacked. Gao, Kevin Mar 1, 2013 954
Digital archiving in the age of cloud computing: whether the concern is protecting data at the personal, professional, or institutional level, digital storage services provide thorough cloud computing technologies that can deliver extraordinarily high levels of protection. Breeding, Marshall Mar 1, 2013 3171
Digital usage policies and the 'new' desktop: every admin knows it--written policies aren't worth the paper they are written on. Austin, Mark Mar 1, 2013 1023
Protect your business from state-sponsored attacks. MacLeod, Calum Mar 1, 2013 1141
Privacy level indicating data leakage prevention system. Kim, Jinhyung; Park, Choonsik; Hwang, Jun; Kim, Hyung-Jong Report Mar 1, 2013 4822
Setting your own network security standards. Lewis, George Feb 1, 2013 1541
Get your migration right by removing admin rights. Avanessian, Andrew Jan 1, 2013 1472
Product piracy prevention: product counterfeit detection without security labels. Horn, Christian; Blankenburg, Matthias; Fechteler, Maximilian; Kruger, Jorg Report Jan 1, 2013 5939
Wireless networks: developments, threats and countermeasures. Noor, Mardiana Mohamad; Hassan, Wan Haslina Report Jan 1, 2013 8383
Five things you can do wirelessly--but is there a price? SecureEnvoy. Dec 1, 2012 1622
Security awareness--once is never enough: Cryptzone UK Ltd. Dec 1, 2012 710
Take a stance on use of force: determine which tactics a guard should use. Morton, Jennie Dec 1, 2012 980
Increase security guards on short notice: tips to leverage your security force for extra protection. Morton, Jennie Oct 1, 2012 681
MODELING AUTHENTICATION AND AUTHORIZATION SECURITY SERVICE FOR WS-SECURITY ARCHITECTURE. Memon, Mukhtiar; Menghwar, Gordhan D.; Jalbani, Akhtar A.; Depar, Mansoor H.; Rahu, Ghulam Ali Report Sep 30, 2012 2434
Blind belief or ignorance? Five of the most common security myths that could make you vulnerable. Grafton, Jane Aug 1, 2012 1026
Process aware host-based intrusion detection model. Jalali, Hanieh; Baraani, Ahmad Report Aug 1, 2012 5979
International perceptions of online banking security concerns. Moscato, Donald R.; Altschuller, Shoshana Report Aug 1, 2012 5601
Can a single security framework address information security risks adequately? Ahmad, Walid Al-; Mohammad, Bassil Report Jul 1, 2012 7237
Privileged access Lifecycle Management. Mutch, John May 1, 2012 818
MDM is not mobile security. Schwartau, Winn May 1, 2012 600
Mobile Security Awareness: Demystified! May 1, 2012 592
An AIS inspired alert reduction model. Mahboubian, Mohammad; Udzir, Nur Izura; Subramaniam, Shamala; Hamid, Nor Asila Wati Abdul Report Apr 1, 2012 4634
Privacy aware recommender service using multi-agent middleware --an IPTV network scenario. Elmisery, Ahmed M.; Botvich, Dmitri Report Mar 1, 2012 12367
Secure key exchange scheme for IPTV broadcasting. Pippal, Ravi Singh; Tapaswi, Shashikala; Jaidhar, C.D. Report Mar 1, 2012 3941
Times limited accountable anonymous online submission control system from single-verifier k-times group signature. Zhao, Xingwen; Zhang, Fangguo Report Mar 1, 2012 6379
The impact of mobility patterns on MANET vulnerability to DDoS attacks/Mobilumo modelio poveikis MANET tinklu jautrumui DDoS atakoms. Stojanovic, M.; Acimovic-Raspopovic, V.; Timcenko, V. Report Mar 1, 2012 4050
Make love not war! Taylor, Grant Jan 1, 2012 857
Message-optimal algorithm for detection and resolution of generalized deadlocks in distributed systems. Srinivasan, Selvaraj; Rajaram, R. Report Dec 1, 2011 7973
Mice and men - dealing with Stuxnet, Duqu, and other pests! MacLeod, Calum Dec 1, 2011 1171
Ensuring protection for sensitive test data. Feravich, Stuart Dec 1, 2011 1252
Are you practicing secure collaboration or is it chaotic? Varonis looks at the implications for organisations that get it wrong and gives advice on how to protect your information in a digital world. Faitelson, Yaki Oct 1, 2011 1035
Securing aerial approaches to joint airfield. Holdsworth, Robert B. Report Jul 1, 2011 2824
Wireless networks interference and security protection by means of vegetation barriers. Acuna, J.; Cuinas, I.; Gomez, P. Report Jun 1, 2011 4366
The specifics of security management: the functions of information security required by organizations. Enescu, Marian; Enescu, Maria; Sperdea, Natalita Maria Report Jun 1, 2011 1842
CipherPoint Software Helps SharePoint Users Understand How to Manage Security and Compliance. Mar 24, 2011 289
Policing Globopolis. Bowling, Ben; Sheptycki, James Essay Mar 22, 2011 8373
An identity-based mediated signature scheme without trusted PKG. Wang, Xiaofeng; Wang, Shangping Report Mar 1, 2011 7094
Resource control and estimation based fair allocation (EBFA) in heterogeneous active networks. Devi, K. Vimala; Thangaraj, C.; Mehata, K.M. Report Mar 1, 2011 7750
IIJ adopts DNSSEC expansion method to upgrade security on DNS services. Jan 17, 2011 129
Keeping it clean: introducing online social media into your educational mission brings you right into a hacker's bull's-eye, Can you ensure your learning environment stays uninfected? Waters, John K. Jan 1, 2011 2883
Principles of war: a closer look at security. Devos, Ed Jan 1, 2011 924
Enhancing DDoS flood attack detection via intelligent fuzzy logic. Xia, Zhengmin; Lu, Songnian; Li, Jianhua; Tang, Junhua Report Dec 1, 2010 6741
Multisignature scheme based on discrete logarithms in the plain public key model. Shao, Zuhua Report Dec 1, 2010 6115
Online intrusion behaviors: sequences and time intervals. Chueh, Hao-En; Ho, Shun-Chuan; Chang, Shih-Peng; Hsu, Ping-Yu Report Nov 1, 2010 2554
How to cut costs and still remain secure: Bob Heard, CEO and co-founder for Credant technologies offers advice on keeping data secure even when your budgets have been slashed. Heard, Bob Nov 1, 2010 1448
Scaling intrusion prevention systems for 10G, 40G and beyond. Barry, Dan Joe Column Oct 1, 2010 1793
Stalking on campus: ensuring security with rights and liberties. Campbell, Julie; Longo, Peter J. Report Jun 1, 2010 7539
Information Assurance. Smith, Martyn Jun 1, 2010 858
Information Assurance problems. Smith, Martyn Jun 1, 2010 546
The compromise crisis_unified security and the real world. Philpot, Andrew Jun 1, 2010 640
SaaS-based IRM solutions to secure the enterprise. Hakhinian, Mush Jun 1, 2010 834
IDF Prepares for Passover. Brief article Mar 28, 2010 80
Identity scramble: automated technology systems are working to keep personal information of district employees and students out of the wrong hands. O'Hanlon, Charlene Mar 1, 2010 1281
10 steps to reduce risk, improve database security, and adhere to compliance mandates. Mar 1, 2010 744
Visa security policy: roles of the departments of state and homeland security. Wasem, Ruth Ellen Mar 1, 2010 10006
Top-10 guide for protecting sensitive data from malicious insiders. Cantos, Brian Feb 1, 2010 3649
Fears remain over data risks. Brief article Feb 1, 2010 206
Hidden information with infraredesign. Ziljak Vujic, Jana; Ziljak Stanimirovic, Ivana; Pogarcic, Ivan Report Jan 1, 2010 1647
Specificities of reliability analyzing of automation and protection systems of electric network. Felea, Ioan; Albut-Dana, Daniel-Traian; Pacureanu, Ion Report Jan 1, 2010 1419
Securing the client-server communication in WCF. Palka, Jan; Palka, Jiri; Motyl, Ivo Report Jan 1, 2010 1292
Security measures in virtual laboratory of microprocessor technology. Dulik, Tomas; Bliznak, Michal Report Jan 1, 2010 1420
Data leakage plan of action: time to plug up the security holes. Jefferies, John Nov 1, 2009 1176
Five best practices for mitigating insider breaches. Bosnian, Adam Nov 1, 2009 1370
Safe at home: combining high-tech safeguards with face-to-face user education is a must for schools whose laptop programs allow students to take the computers off-site. O'Hanlon, Charlene Oct 1, 2009 1409
A million English words and it security what's the connection. Macleod, Calum Aug 1, 2009 1435
Simulation of a two-category secured access database. Shing, Marn-Ling; Shing, Chen-Chi; Chen, Kuo Lane; Lee, Huei Report Aug 1, 2009 3494
Telehealth Ontario detection of gastrointestinal illness outbreaks. Caudle, Jaelyn M.; van Dijk, Adam; Rolland, Elizabeth; Moore, Kieran M. Jul 1, 2009 3401
Securing the community college: strategies for managing security issues at two-year institutions. McClure, Ann Jul 1, 2009 1135
Colleges and universities must not rest on their laurels: institutions must gear up to face new challenges, such as ensuring campus security, keeping up with technology and maintaining quality. Wheelan, Belle S. Jun 11, 2009 695
The importance of standardising methodology in penetration testing. Frankland, Jane Jun 1, 2009 824
The 2009 influenza pandemic: an overview. Lister, Sarah A.; Redhead, C. Stephen Report Jun 1, 2009 12581
State of insecurity. Mangu-Ward, Katherine Interview Apr 1, 2009 656
Three steps to security. Brief article Jan 1, 2009 294
Providing security for the Democratic National Convention. Hasenauer, Heike Brief article Dec 1, 2008 271
Providing security for the Republican National Convention. Monroe, Cassandra Dec 1, 2008 372
Managing security threat groups and correctional intelligence: a case for using auditing teams as a threat management tool. Baykan, Y.N. Oct 1, 2008 1869
Converge your resources: linking physical security and cyber security methods can maximize a district's safety efforts. Fletcher, Geoffrey H.; Jensen, Ralph C. Oct 1, 2008 429
More is more: no one solution can defend K-12 computer networks against the proliferation of digital threats. A multilayered strategy that addresses cyber safety on many fronts is a district's best hope. McDonough, Andy Oct 1, 2008 2175
Consumers voice their banking concerns. Klie, Leonard Sep 1, 2008 504
Do you know the drill? District leaders are becoming more proactive with emergency drills. Pascopella, Angela Aug 1, 2008 2805
Security officers speak out: five public safety directors share their insights on securing a campus and how current issues are shaping that responsibility. Herrmann, Michele Jul 1, 2008 2114
Police practice: public tours of local jails. Wilson, Craig R. Report Jun 1, 2008 1927
Define your mobility strategy: companies can equip a mobile workforce for greater productivity, cost savings and enhanced security. Yu, Shane Jun 1, 2008 1431
Infosecurity Europe 2008. Apr 1, 2008 4373
Safe and sound: the role of HR in enhancing campus safety. Patton, Carol Mar 1, 2008 1513
PCI compliance: what it means to the call center industry. Carrington, Christopher M. Mar 1, 2008 1376
Information security standards: the 10 keys to protecting your network. Lindenmayer, Gerhard Dec 1, 2007 745
The privatization of citizen security in Latin America: from elite guards to neighborhood vigilantes. Ungar, Mark Case study Sep 22, 2007 8418
The private/public security Nexus in China. Trevaskes, Susan Sep 22, 2007 8258
The best professionals partner with the best technology. Hall, J. Daron Jun 1, 2007 882
Mall terror. Grinberg, Maya May 1, 2007 518
Fort Leavenworth employs low-cost security enhancement at access control points. Cashin, Eric; Weathersbee, Tim Mar 22, 2007 1002
Brand protection and anti-counterfeiting summit. Sartor, Michelle Jan 1, 2007 1177
Copiers can be compromised. Swartz, Nikki Brief article Jan 1, 2007 158
Detecting early signs of trouble: dwindling time for reaction is a feature of the modern international scene. Companies must get better at spotting warning signs and anticipating problems. Hall, Robert Nov 1, 2006 1876
Security convergence roadmap released. Piazza, Peter Brief article Nov 1, 2006 277
The shield and the cloak: the 21st century demands a more expansive understanding of national security. Hart, Gary Viewpoint essay Sep 22, 2006 2853
In an effort to prevent student-party riots or violence, an Ames, lowa, ordinance requires a permit if more than one beer-keg tap is to be used at a time. Brief article Sep 1, 2006 89
Olden days, new technology: evoking memories of "the good old days" can be good business, but security can't rely on systems from a bygone era. Longmore-Etheridge, Ann Sep 1, 2006 1126
Patrolling performance: find out how this school fixed a problem it had with poor performance among its guards. Penso, Guillermo Guevara Sep 1, 2006 2611
Seeing the risk through the trees. Almay, Ted Sep 1, 2006 2706
Data storage and disaster recovery: be prepared. And be prepared now. Colby, Kent L. Aug 1, 2006 1693
Gangs, kidnappers, and other threats. Piazza, Peter Aug 1, 2006 2895
Positive SPIN on liaisons: find out how the Security Police Information Network (SPIN) promotes public-private information sharing. Farber, Oksana Jun 1, 2006 1581
Identity theft: targeting younger victims. Britt, Phillip May 1, 2006 721
The time for urgency is now[SM]. Lipman, Ira A. Feb 1, 2006 1124
The security consultant. Dec 1, 2005 323
The security consultant. Dec 1, 2005 368
Don't be spooked by spyware. Honen, Tomer Dec 1, 2005 2582
Fifty years of advancing security. Davidson, Mary Alice Dec 1, 2005 2761
Premises liability. Anderson, Teresa Brief Article Dec 1, 2005 837
Can't they just get along? Gips, Michael A. Brief Article Nov 1, 2005 152
Animal ID fights agroterrorism: a private-sector database could serve as a repository for a U.S. animal ID system. Roberts, Marta Nov 1, 2005 518
Integrating risk management & security. Atkinson, William Oct 1, 2005 2111
A site to see. Piazza, Peter Brief Article Sep 1, 2005 180
Containing cargo risk: find out how the government and private industry are working to reduce the possibility of a terrorist using cargo to send a weapon of mass destruction into the United States. Anderson, Teresa Sep 1, 2005 4941
Security horizons. Aug 10, 2005 835
Party planning under the gun: the Frazier Historical Arms Museum's security team tells how it targeted plans for the opening gala. Hawkins, Jeffrey A. May 1, 2005 3226
Defending the network. Perry, Simon Dec 1, 2004 1320
How to temper fear and loathing of your security measures. Califano, Frank, Jr. Oct 6, 2004 971
An Island of protection: find out how the Secret Service worked with multiple law enforcement groups to protect the heads of state at the G-8 Summit in Georgia. Gips, Michael A. Sep 1, 2004 5859
Windows Server hacks: creating a password reset disk. Tuhoch, Mitch Sep 1, 2004 965
Orchestrating an integrated performance: a physical security program should harmonize four core components, including the often-overlooked human factor. Braden, Timothy J. Jul 1, 2004 2207
CD-based security resources. Piazza, Peter Brief Article Apr 1, 2004 90
DHS to Publish Security Outreach Plan. Murphy, Kevin Mar 17, 2004 466
Training your team: whether it's the battlefield, the basketball court, or the business world, training is the key to a winning team. Morris, Ronald J.; Yaross, Dan; McGuire, Colleen Feb 1, 2004 2004
How companies can compete for contracts; more and more technology providers will be contracting with the department of Homeland Security. To be successful, they must know how to proceed. Housman, Rob; Anikeeff, Tony Jan 1, 2004 2836
Power to the people: because of an innovative partnership for regional infrastructure security, the U.S. Northwest is better prepared for disaster. Scalingi, Paula L.; Morrison, Matt Dec 1, 2003 3200
ASIS guidelines update. Dec 1, 2003 381
The path to truth, so to speak. Gips, Michael A. Nov 1, 2003 748
Confronting the suicide-bomber threat. Gips, Michael A. Nov 1, 2003 594
Technology: two quick hits. Krasnick, Steven H. Sep 1, 2003 404
Security and technology--new challenges, creative solutions. Fox, Alexander Jul 1, 2003 590
The new centurions: terrorism and other global forces are reshaping corporate security, creating challenges and opportunities for those who oversee it. (Progress Report). Harowitz, Sherry L. Jan 1, 2003 3861
Winning the cybersecurity war: "he who excels at resolving difficulties does so before they arise. He who excels in conquering his enemies triumphs before threats materialize."--Sun Tzu. (Security). Howes, Tim Oct 1, 2002 1482

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters