Keyword: security

Found 180 papers in total
The Effects of Agglomeration and National Property Rights on Digital Confidentiality Performance
2017,
In recent years, instances of organizations failing to maintain digital...
Information systems security policy implementation in practice: from best practices to situated practices
2017,
Organizations face institutional pressure to adopt information systems security (ISS)...
A Game-Theoretical Model to Improve Process Plant Protection from Terrorist Attacks
2016,
The New York City 9/11 terrorist attacks urged people from academia as well as from...
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study
2016,
Users are vital to the information security of organizations. In spite of technical...
Attacker Deterrence and Perceived Risk in a Stackelberg Security Game
2016,
In Stackelberg security games, a defender must allocate scarce resources to defend...
Assessment of risks and control conditions for some scenarios on unauthorised usage of nuclear materials
2016,
Conditions of nuclear materials secure management inside the nuclear sites as well as...
Information system aiding the logistics processes of loading and securing in railway transport
2016,
The loading of cargo onto railway freight wagons and its securing is a very important...
An improvement of a cryptanalysis algorithm
2016,
In this paper we present simulations that show how some pseudo random number...
Signed digit data hiding scheme
2016,
The EMD (Exploiting Modification Direction) method by Zhang and Wang uses ( 2 n +...
A Denial of Service attack against fair computations using Bitcoin deposits
2016,
Bitcoin supports complex transactions where the recipient of a transaction can be...
Improved improbable differential attacks on ISO standard CLEFIA: Expansion technique revisited
2016,
Improbable differential cryptanalysis is a recent attack technique that generalizes...
Generalized MitM attacks on full TWINE
2016,
TWINE is a lightweight block cipher which employs a generalized Feistel structure with...
Breaking an ID-based encryption based on discrete logarithm and factorization problems
2016,
Identity‐based (ID‐based) cryptography is very useful as it can simplify...
A novel edge based image steganography with 2
            k
           correction and Huffman encoding
2016,
Image steganography is the art of hiding information into a cover image. It derives...
Linear cryptanalysis of reduced-round SPECK
2016,
SPECK is a family of lightweight block ciphers which was proposed by United States...
Dispositional and situational factors: influences on information security policy violations
2016,
Insiders represent a major threat to the security of an organization’s...
The impacts of organizational culture on information security culture: a case study
2016,
Information security cannot rely solely on technology. More attention must be drawn to...
Challenges and opportunities for implementing X-ray scanning technology at the Korean hub ports
2016,
Over the last few years, a series of legislative attempts to mandate 100%...
Building secure and robust microgrids: an overview of technical and security concerns
2016,
Microgrids are modern, localised versions of the centralised utility grid. They have...
A metaheuristic for security budget allocation in utility networks
2017,
Real‐life utility networks such as smart grids, pipelines, and water networks...
A biobjective decision model to increase security and reduce travel costs in the cash-in-transit sector
2017,
In this paper, we present a variant of the vehicle routing problem (VRP) to increase...
A mining approach for component abnormal information based on monitor log
2016,
A software component is an assembly unit that can be deployed independently in any...
On the Effectiveness of Security Countermeasures for Critical Infrastructures
2016,
A game‐theoretic model is developed where an infrastructure of N targets is...
Adversarial Risk Analysis for Urban Security Resource Allocation
2016,
Adversarial risk analysis (ARA) provides a framework to deal with risks originating...
Papers per page: