Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

3 4 5 6 7
hits: 351
41.
  • Password Security: An Empir... Password Security: An Empirical Study
    Zviran, Moshe; Haga, William J. Journal of management information systems, 04/1999, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Organizations are more dependent than ever on the reliable operation of their information systems, which have become a key to their success and effectiveness. While the growing dependence on ...
Full text
Available for: BFBNIB, CEKLJ, IZUM, KILJ, NMLJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK
42.
  • Technology-push and need-pu... Technology-push and need-pull roles in information system security diffusion
    Yeh, Quey-Jen; Chang, Arthur Jung-Ting International journal of technology management, 01/2011, Volume: 54, Issue: 2/3
    Journal Article
    Peer reviewed

    Research of information system security (ISS) usually conceives of security models on the basis of positive, strategic benefits, such as planning or developing a security baseline. However, ISS works ...
Full text
43.
  • A Research Agenda for Secur... A Research Agenda for Security Engineering
    Rich Goyette; Yan Robichaud; François Marinier Technology innovation management review, 08/2013 August 2013: Cybersecurity
    Journal Article
    Peer reviewed
    Open access

    Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As ...
Full text
Available for: CEKLJ, IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
44.
  • User-centred security event visualisation
    Humphries, Christopher
    Dissertation
    Open access

    Il est aujourd'hui de plus en plus difficile de gérer les énormes quantités de données générées dans le cadre de la sécurité des systèmes. Les outils de visualisation sont une piste pour faire face à ...
Check availability
45.
  • Adversarial Cross-laser Attack: Effective Attack to DNNs in the Real World
    Wu, Hanyu; Yan, Ke; Xu, Peng ... 2024 12th International Symposium on Digital Forensics and Security (ISDFS), 2024-April-29
    Conference Proceeding

    Deep neural networks for image classification have been widely used to enhance user experience, but adversarial attacks continue to pose a threat to the security of deep neural networks related ...
Full text
Available for: IJS, NUK, UL, UM
46.
  • A Highly Recoverable and Ef... A Highly Recoverable and Efficient Filesystem
    Alhussein, Mohammed; Wijesekera, Duminda Procedia technology, 2014, 2014-00-00, Volume: 16
    Journal Article
    Peer reviewed
    Open access

    Data recovery is a significant problem that presents a real challenge to forensics investigators today. File carvers have traditionally helped mitigate these difficulties. However, two issues still ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
47.
  • Holistic Approach for Gover... Holistic Approach for Governing Information System Security
    Spremic, Mario World Congress on Engineering, 01/2013, Volume: 2
    Journal Article

    Over the past decade information system security issues has been treated mainly from technology perspective. That model of information security management was reactive, mainly technologically driven ...
Full text
Available for: NUK, UL, UM
48.
  • Information System Security... Information System Security Commitment: A Pilot Study of External Influences on Senior Management
    Tejay, Gurvirender P. S.; Barton, Kevin A. 2013 46th Hawaii International Conference on System Sciences, 2013-Jan.
    Conference Proceeding

    This study investigated how external influences motivate senior management to commit to information system security (ISS) by examining the mediating role of senior management between external ...
Full text
Available for: IJS, NUK, UL, UM
49.
  • An Integrated Formal Description Method for Network Attacks
    Yang, Hanlin; Chen, Tianyu; Zhang, Hang ... 2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT), 2022-Aug.
    Conference Proceeding

    As the complexity and concealment of network attacks are increasing day by day, construction of a comprehensive and effective defense system calls for modeling and formal description of the scenes, ...
Full text
Available for: IJS, NUK, UL, UM
50.
  • A New Approach of Information System Security Governance: A Proposition of the Continuous Improvement Process Model of Information System Security Risk Management: 4D-ISS
    Zaydi, Mounia; Nassereddine, Bouchaib 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
    Conference Proceeding

    Nowadays the information system security (ISS) has become the main lever of the world economy, it is the keystone for the creation of value, and its unavailability has an undeniable technical, human ...
Full text
Available for: IJS, NUK, UL, UM
3 4 5 6 7
hits: 351

Load filters