Sciweavers

156 search results - page 28 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 13 days ago
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem
The threat of abandoned or extensively overhauled IS is a major concern for both MIS specialists and businesses. This concern may stem from the mismatch between MIS specialist cha...
Meral Binbasioglu, Elaine Winston
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 5 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
WER
2004
Springer
14 years 25 days ago
A pattern language to join early and late requirements
At present, the early phase of Requirements Engineering is a new research area in the Software Engineering field. This phase is concerned with the analysis of the organizational c...
Alicia Martínez, Oscar Pastor, Hugo Estrada
GIS
2003
ACM
14 years 8 months ago
Attribute space visualization of demographic change
This paper introduces an approach for closer integration of selforganizing maps into the visualization of spatio-temporal phenomena in GIS. It is proposed to provide a more explic...
André Skupin, Ron Hagelman