Sciweavers

1422 search results - page 61 / 285
» Information security and risk management
Sort
View
HICSS
2006
IEEE
160views Biometrics» more  HICSS 2006»
14 years 3 months ago
Cyber Defense Competitions and Information Security Education: An Active Learning Solution for a Capstone Course
The content of information security curricula spans a wide array of topics. Because of this variety, a program needs to focus on some particular aspect and provide appropriate dep...
Art Conklin
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
14 years 3 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke
SPIRE
2001
Springer
14 years 1 months ago
Adding Security to Compressed Information Retrieval Systems
Word-based Huffman coding has widespread use in information retrieval systems. Besides its compressing power, it also enables the implementation of both indexing and searching sch...
Ruy Luiz Milidiú, C. Gomes de Mello, J. Fer...
JDCTA
2010
143views more  JDCTA 2010»
13 years 3 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
COLING
2008
13 years 10 months ago
Bayes Risk-based Dialogue Management for Document Retrieval System with Speech Interface
We propose an efficient dialogue management for an information navigation system based on a document knowledge base with a spoken dialogue interface. In order to perform robustly ...
Teruhisa Misu, Tatsuya Kawahara