Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
The Effects of Agglomeration and National Property Rights on Digital Confidentiality Performance
2017,
Boyer Kenneth K
In recent years, instances of organizations failing to maintain digital...
Information systems security policy implementation in practice: from best practices to situated practices
2017,
Niemimaa Elina
Organizations face institutional pressure to adopt information systems security (ISS)...
A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks
2016,
Zhang Laobing
The New York City 9/11 terrorist attacks urged people from academia as well as from...
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
2016,
Vance Anthony
Users are vital to the information security of organizations. In spite of technical...
Attacker Deterrence and Perceived Risk in a Stackelberg Security Game
2016,
Ridinger Garret
In Stackelberg security games, a defender must allocate scarce resources to defend...
Assessment of risks and control conditions for some scenarios on unauthorised usage of nuclear materials
2016,
Masterov Sergey Victorovich
Conditions of nuclear materials secure management inside the nuclear sites as well as...
Information system aiding the logistics processes of loading and securing in railway transport
2016,
Lorenc Augustyn
The loading of cargo onto railway freight wagons and its securing is a very important...
An improvement of a cryptanalysis algorithm
2016,
Benamara Oualid
In this paper we present simulations that show how some pseudo random number...
Signed digit data hiding scheme
2016,
Kuo Wen-Chung
The EMD (Exploiting Modification Direction) method by Zhang and Wang uses ( 2 n +...
A Denial of Service attack against fair computations using Bitcoin deposits
2016,
Beekman Jethro G
Bitcoin supports complex transactions where the recipient of a transaction can be...
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
2016,
Tezcan Cihangir
Improbable differential cryptanalysis is a recent attack technique that generalizes...
Generalized MitM attacks on full TWINE
2016,
Youssef Amr M
TWINE is a lightweight block cipher which employs a generalized Feistel structure with...
Breaking an ID-based encryption based on discrete logarithm and factorization problems
2016,
Tan Chik How
Identity‐based (ID‐based) cryptography is very useful as it can simplify...
A novel edge based image steganography with 2 k correction and Huffman encoding
2016,
Sun Shuliang
Image steganography is the art of hiding information into a cover image. It derives...
Linear cryptanalysis of reduced-round SPECK
2016,
Wang Wei
SPECK is a family of lightweight block ciphers which was proposed by United States...
Dispositional and situational factors: influences on information security policy violations
2016,
Warkentin Merrill
Insiders represent a major threat to the security of an organization’s...
The impacts of organizational culture on information security culture: a case study
2016,
Zhang Tao
Information security cannot rely solely on technology. More attention must be drawn to...
Challenges and opportunities for implementing X-ray scanning technology at the Korean hub ports
2016,
Min Hokey
Over the last few years, a series of legislative attempts to mandate 100%...
Building secure and robust microgrids: an overview of technical and security concerns
2016,
Chasaki Danai
Microgrids are modern, localised versions of the centralised utility grid. They have...
A metaheuristic for security budget allocation in utility networks
2017,
Srensen Kenneth
Real‐life utility networks such as smart grids, pipelines, and water networks...
A biobjective decision model to increase security and reduce travel costs in the cash-in-transit sector
2017,
Springael Johan
In this paper, we present a variant of the vehicle routing problem (VRP) to increase...
A mining approach for component abnormal information based on monitor log
2016,
Chen Jinfu
A software component is an assembly unit that can be deployed independently in any...
On the Effectiveness of Security Countermeasures for Critical Infrastructures
2016,
Hausken Kjell
A game‐theoretic model is developed where an infrastructure of N targets is...
Adversarial Risk Analysis for Urban Security Resource Allocation
2016,
Rios Insua David
Adversarial risk analysis (ARA) provides a framework to deal with risks originating...
First Page
1
2
3
4
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers