Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
    • by 
    •   3  
      Information SecurityComputers SecurityInformation System
    • by  and +2
    • Computers Security
    • by 
    •   7  
      PrivacyInternet SecurityDistributed SystemDistributed Systems
    • by  and +1
    • Computers Security
    • by 
    •   5  
      Neural NetworkIntrusion Detection SystemK means algorithmK means Clustering
    • by 
    •   2  
      Computer ScienceComputers Security
    • by 
    •   9  
      Information SecurityDecision MakingInformation Communication TechnologyManagement Science
    • by 
    •   9  
      AssessmentNetwork SecuritySecurityAnomaly Detection
    • by 
    • Computers Security
    • by 
    •   5  
      Security in routing protocolsSecurity ManagementSecurity ProtocolCertificate Authority
    • by 
    •   9  
      Information SecurityComputer SecuritySEMSecurity Policy
Abstract. Incident response is a critical security function in organisations that aims to manage incidents in a timely and cost-effective manner. This research was motivated by previous case studies that suggested that the practice of... more
    • by 
    •   5  
      Computer ScienceInformation SecuritySecurity ManagementIncident Response
    • by  and +1
    •   4  
      Block CipherEncryption AlgorithmComputers SecurityStream Cipher
Information technology has become an integral part of modern life. Today, the use of information permeates every aspect of both business and private lives. Most organizations need information systems to survive and prosper and thus need... more
    • by 
    •   10  
      Information TechnologyInformation SecurityOrganizational LearningHuman Factors
    • by 
    •   5  
      Public Key InfrastructureAccess ControlDistributed SystemIdentity management
    • by 
    •   3  
      Information SecurityCorporate GovernanceComputers Security
    • by 
    •   2  
      BehaviorComputers Security
    • by 
    •   4  
      VulnerabilityWeb Securityhidden Markov modelComputers Security
    • by 
    •   3  
      PrivacyConceptual ModelComputers Security
    • by 
    •   3  
      Social Cognitive TheorySelf EfficacyComputers Security
    • by 
    •   6  
      Network SecurityComputer SecurityOPERATING SYSTEMIntrusion Detection
    • by 
    •   7  
      Human Computer InteractionInformation SecurityUser InterfaceCase Study
    • by  and +1
    •   3  
      PrivacyComputers SecurityFalse positives
    • by  and +1
    •   6  
      Communication ChannelsViral InfectionNext GenerationNetwork Services
    • by 
    •   6  
      PrivacyInformation ProcessingError CorrectionHUMAN ERROR
    • by 
    • Computers Security
    • by 
    •   9  
      MathematicsComputer ScienceMachine LearningAndroid
    • by 
    • Computers Security
Security awareness is important to reduce human error, theft, fraud, and misuse of computer assets. A strong ICT security culture cannot develop and grow in a company without awareness programmes. This paper focuses on ICT security... more
    • by 
    •   3  
      Decision MakingHUMAN ERRORComputers Security
    • by 
    •   3  
      Information ManagementSecurity RequirementsComputers Security
    • by 
    •   8  
      Control Systems EngineeringTaxonomyAccess ControlDelegation
    • by 
    •   7  
      Information TechnologyInformation SecurityComputer SecuritySurveys
    • by  and +2
    • Computers Security
    • by 
    •   2  
      Theory of Planned BehaviorComputers Security
    • by 
    •   2  
      Data PrivacyComputers Security
    • by 
    •   4  
      Intrusion DetectionText CategorizationIntrusion Detection SystemComputers Security
    • by 
    • Computers Security
    • by 
    •   4  
      Risk AnalysisCase StudyOrganisational cultureComputers Security
    • by  and +1
    • Computers Security
    • by 
    • Computers Security
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid... more
    • by 
    •   7  
      Distributed ComputingPublic Key InfrastructureAccess ControlDistributed System
    • by 
    •   2  
      Survey dataComputers Security
    • by 
    •   3  
      DATABASE MANAGEMENT SYSTEMMultilevel SecurityComputers Security
    • by 
    •   2  
      Computer ScienceComputers Security
    • by 
    •   24  
      Materials EngineeringMechanical EngineeringChemical EngineeringCondensed Matter Physics
    • by 
    •   4  
      Information TechnologyHealthcareEvent StudyComputers Security
    • by 
    •   10  
      Information SystemsInternet Routing ProtocolComputer SoftwareDesign Rationale
    • by 
    •   8  
      Wireless securityRBACWireless NetworkWireless Lan
    • by  and +1
    •   10  
      Information TechnologyInformation SecurityOrganizational LearningHuman Factors
    • by 
    •   4  
      Digital ForensicsGold StandardBody of KnowledgeComputers Security