نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
This article is a retrospective of concepts and people who have contributed significantly to the IEEE Symposium on Security and Privacy over the past 30 years. • We identify many individuals who have contributed to SSP as program chairs, general chairs, and heads of the overseeing IEEE technical committee. • We recognize SSP participants who have provided significant leadership in creating and ...
F or 35 years, the IEEE Symposium on Security and Privacy has provided a venue for leading researchers in security and privacy to gather. It continues to be the premier forum for presenting developments in computer security and electronic privacy and for bringing together researchers and practitioners. Th e topics covered at the symposium have varied over the years, yet the work presented has a...
During the five years of existence of this minitrack, we have published fourteen papers that focus on the intersection of knowledge management and organizational or individual security. Ilvonen, Jusilla, Kärkkäinen, and Paivarint (2015), Ilvonen, Alnne, Helander, and Vayrunen (2016), and Sarigianni, Thallmann, and Manhart (2016) focus on how to protect shared knowledge either within the organiz...
Previous papers mostly dealt with specific views of information security management (either technical, organizational for instance). Recently, major progress has been achieved in the development of a business driven approach with BORIS (Business Oriented management of Information Security) and a process-oriented approach called ORBIT (Operational Risks in Business and IT). An integrated framewo...
0278-6648/03/$17.00 © 2003 IEEE 33 he events of 11 September 2001 sent a ripple of fear across the United States. The US government sought to alleviate the increased concerns by enforcing strict security in airports, government buildings and athletic stadiums; however, with any security there is a price. For airline passengers that price was long lines caused by multiple security checks placed ...
Organizations know that investing in security measures is an important requirement for doing business. But how much should they invest and how should those investments be directed? Many organizations have turned to a risk management approach to identify the largest threats and the control measures that could mitigate those threats. These papers present a framework to help in an analysis of the ...
In a series of papers, Küsters et al. investigated the relationships between various notions of simulation-based security. Two main factors, the placement of a “master process” and the existence of “forwarder processes”, were found to affect the relationship between different definitions. In this extended abstract, we add a new dimension to the analysis of simulation-based security, namely, the...
Abstract Introduction: Looking at the role of midwives and the need to invest in this profession in order to achieve development objectives. Objective: The aim of this study is to review the characteristics of midwifery care presentation models in the world as well as in Iran and investigate its challenges in the country. Materials and Methods: This study is a review done in 2016. Fi...
Cyber security is vital to the success of today’s digital economy. The major security threats are coming from within, as opposed to outside forces. Insider threat detection and prediction are important mitigation techniques. This study addresses the following research questions: 1) what are the research trends in insider threat detection and prediction nowadays? 2) What are the challenges assoc...
Background and Aims: The crisis of Rohingya Muslim refugees has become one of the challenging issues of the last decade. The organized massacre of Rohingya people in Myanmar has forced them to relocate to Bangladesh, creating the worldchr('39')s largest refugee camp. The purpose of this study is to assess the health status of these refugees. Methods: The present study was conducted using a syst...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید