NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

2 3 4 5 6
hits: 336
31.
  • On ISSM and leveraging the ... On ISSM and leveraging the Cloud towards faster quantification of the uncertainty in ice-sheet mass balance projections
    Larour, E.; Schlegel, N. Computers & geosciences, November 2016, 2016-11-00, 20161101, Volume: 96
    Journal Article
    Peer reviewed

    With the Amazon EC2 Cloud becoming available as a viable platform for parallel computing, Earth System Models are increasingly interested in leveraging its capabilities towards improving climate ...
Full text
32.
  • Survey on Key Technology De... Survey on Key Technology Development and Application in Trusted Computing
    Wang, Juan; Shi, Yuan; Peng, Guojun ... China communications, 11/2016, Volume: 13, Issue: 11
    Journal Article
    Peer reviewed

    Trusted computing,which can effectively increase the credibility of information system,has made great achievements and is in continuous development. For country who is going to strengthen network ...
Full text
33.
  • Analysis of vulnerability a... Analysis of vulnerability assessment results based on CAOS
    Corral, G.; Garcia-Piquer, A.; Orriols-Puig, A. ... Applied soft computing, 10/2011, Volume: 11, Issue: 7
    Journal Article
    Peer reviewed

    Information system security must battle regularly with new threats that jeopardize the protection of those systems. Security tests have to be run periodically not only to identify vulnerabilities but ...
Full text
34.
Full text

PDF
35.
  • Security Attack Testing (SA... Security Attack Testing (SAT)—testing the security of information systems at design time
    Mouratidis, Haralambos; Giorgini, Paolo Information systems, 12/2007, Volume: 32, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number of languages, ...
Full text

PDF
36.
Full text

PDF
37.
  • Password Security: An Empir... Password Security: An Empirical Study
    Zviran, Moshe; Haga, William J. Journal of management information systems, 04/1999, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Organizations are more dependent than ever on the reliable operation of their information systems, which have become a key to their success and effectiveness. While the growing dependence on ...
Full text
38.
Full text

PDF
39.
  • A Research Agenda for Secur... A Research Agenda for Security Engineering
    Rich Goyette; Yan Robichaud; François Marinier Technology innovation management review, 08/2013 August 2013: Cybersecurity
    Journal Article
    Peer reviewed
    Open access

    Despite nearly 30 years of research and application, the practice of information system security engineering has not yet begun to exhibit the traits of a rigorous scientific discipline. As ...
Full text
40.
  • Information System Security Reinforcement with WGAN-GP for Detection of Zero-Day Attacks
    Mu, Ziyu; Shi, Xiyu; Dogan, Safak 2024 7th International Conference on Artificial Intelligence and Big Data (ICAIBD), 2024-May-24
    Conference Proceeding

    Growing sophistication among cyber threats has posed increasing challenges to the security and reliability of information systems, especially in the face of zero-day attacks that exploit unknown ...
Full text
2 3 4 5 6
hits: 336

Load filters