Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Annotation Today, security threats are hardly sheer technical They are rather socio technical threats and come from adversaries who combine social engineering practices with technical skills to circumvent the defenses of information systems Socio technical attacks often succeed by exploiting the users ill understanding of security mechanisms or loopholes in poorly designed user interfaces and unclear security policies In securing systems against these threats, humans obviously cannot be treated as machines Humans have peculiar decision making But they actions and behavioural patterns, despite apparently irrational, are perfectly justifiable from a cognitive and a social perspective Computer security hence appears to acquire more and more the facets of an interdisciplinary science with roots in both interpretive and positivist research traditions.
Computer networks --- Computer security --- Computer crimes --- Security measures --- Social aspects --- Prevention
Choose an application
Choose an application
Choose an application
Programming --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- veiligheidsdiensten --- datamining --- applicatiebeheer --- apps --- software engineering --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- data acquisition
Choose an application
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022. The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.
Data protection. --- Computer networks. --- Software engineering. --- Data mining. --- Application software. --- Security Services. --- Data and Information Security. --- Computer Communication Networks. --- Software Engineering. --- Data Mining and Knowledge Discovery. --- Computer and Information Systems Applications. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Computer security
Choose an application
This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11–13, 2021 and February 9–11, 2022. respectively. The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.
Data protection. --- Cryptography. --- Data encryption (Computer science). --- Computer networks—Security measures. --- Software engineering. --- Computer engineering. --- Computer networks. --- Data and Information Security. --- Cryptology. --- Mobile and Network Security. --- Security Services. --- Software Engineering. --- Computer Engineering and Networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computers --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Distributed processing --- Design and construction
Choose an application
This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from February 11-13, 2021 and February 9-11, 2022. respectively. The 6 full papers included in this book were carefully reviewed and selected from 217 submissions. The ICISSP 2021 and 2022 book contains extended and revised version of proceedings papers dealing with information systems security and privacy.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheidsdiensten --- veiligheid (technologie) --- cryptografie --- informatica --- netwerken (informatica) --- software engineering --- computerbeveiliging --- mobiele communicatie
Choose an application
Choose an application
We are glad to present, also this year, STAST, the Workshop on Socio-Technical Aspects in Security and Trust. The workshop, in its 7th edition, is once more time and proudly co-located with the Annual Computer Security Applications Conference (ACSAC). At its conception, STAST has been thought as a forum for researchers who are interested in security and have 14 the challenge to develop an interdisciplinary understanding of the subject, being them computer scientists venturing in other domains or the vice-versa, other domains' experts interested in steering their research to include security aspects.
Choose an application
Computer networks --- Computer security --- Computer crimes --- Security measures --- Social aspects --- Prevention
Listing 1 - 10 of 10 |
Sort by
|