Sciweavers

3149 search results - page 165 / 630
» IT security risk management
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 9 months ago
Discovering significant rules
In many applications, association rules will only be interesting if they represent non-trivial correlations between all constituent items. Numerous techniques have been developed ...
Geoffrey I. Webb
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
14 years 4 months ago
Building Leadership for Life Cycle Business Transition by Hybrid Innovation
Manufacturing companies that are expanding their product offering to cover also lifecycle services in the customers’ facilities are facing the increasing complexity and risk to ...
Vesa Salminen
HICSS
2008
IEEE
161views Biometrics» more  HICSS 2008»
14 years 3 months ago
A Methodological Proposal to Assess the Feasibility of ERP Systems Implementation Strategies
Continuous failures in ERP systems implementation project are today the main challenge in the feasibility of integrated information systems. Failure can be determined by different...
Guido Capaldo, Pierluigi Rippa
ATAL
2009
Springer
14 years 3 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ICCCN
2007
IEEE
14 years 3 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...