نتایج جستجو برای: computer security
تعداد نتایج: 723551 فیلتر نتایج به سال:
Instinct tells us that computer security and computer usability are inversely proportional to each other. In other words, the tougher and stricter the security is, the less usability there is, and vice versa. However, there have been plenty of cases where both computer security and computer usability went hand in hand with each other and actually improved together. In the last few years securit...
Design and implementation of intrusion detection systems remain an important research issue in order to maintain proper network security. Despite the undeniable progress in the area of computer security there is still much to be done to improve security of today’s computer systems and so many mechanisms have been developed to assure its security. These systems are vulnerable to attacks from bot...
The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the prob...
Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the socio-behavioral perspective, as the behavior of home computer users on security issues is one of the most important factors in securing the cyberspace. The decomposed Theory of Planned Behavior is adapted to investigate ...
INTRODUCTION ...................................................................................164 I. A MODEL FOR WHEN DISCLOSURE HELPS SECURITY ...........167 A. Case A: The Open Source Paradigm....................................167 B. Case B: The Military Paradigm............................................169 C. Case C: The Information Sharing Paradigm........................171 D. Case D:...
The National Computer Systems Laboratory (NCSL) of the National Institute of Standards and Technology (NIST) and the National Computer Security Center (NCSC) of the Department of Defense (DoD) co-sponsored the Twelfth National Computer Security Conference held in Baltimore, Maryland on October 10-13, 1989. The theme of the conference, "Information Systems Security: Solutions for Today—Concepts ...
Almeshekah, Mohammed H. PhD, Purdue University, August 2015. Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses. Major Professors: Eugene H. Spafford and Mikhail J. Atallah. As the convergence between our physical and digital worlds continue at a rapid pace, securing our digital information is vital to our prosperity. Most current typi cal computer systems are unwittingly h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید