Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: security
Found
180 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Handling least privilege problem and role mining in RBAC
2015,
Du Hongwei
For a given role‐based access control (RBAC) configuration, user‐role...
A hybrid ranking approach to estimate vulnerability for dynamic attacks
2011,
Zhang Qin
To enhance security in dynamic networks, it is important to evaluate the...
Analysis of the generalized self-shrinking generator
2011,
Fster-Sabater A
This work shows that the output sequences of a well‐known cryptographic...
Cryptanalysis of a quadratic knapsack cryptosystem
2011,
Youssef Amr M
Wang and Hu [B. Wang and Y. Hu, Quadratic compact knapsack public‐key...
A new multi-objective model for supplier selection
2015,
Jolai Fariborz
In an order allocation model, selected evaluation criteria in most of the available...
When Lanchester met Richardson, the outcome was stalemate: A parable for mathematical models of insurgency
2015,
MacKay Niall J
Many authors have used dynamical systems to model asymmetric war. We explore this...
The perceived impacts of AEO security certifications on supply chain efficiency - a survey study using structural equation modelling
2015,
Urciuoli Luca
A new topic that during the last years has come to the attention of researchers is...
Economics of information security investment in the case of concurrent heterogeneous attacks with budget constraints
2013,
Huang C Derrick
In this study we develop an analytic model for information security investment...
Detection of DDoS attacks using optimized traffic matrix
2012,
Lee Sang Min
Distributed Denial of Service (DDoS) attacks have been increasing with the growth of...
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols
2012,
Lee Kyungroul
Recently, IT technologies are becoming focused on different traditional industries....
Linguistic protocols for secure information management and sharing
2012,
Ogiela Marek R
One issue which is essential for the security of calculations and communication as...
Executing mobile applications on the cloud: Framework and issues
2012,
Hung Shih-Hao
Modern mobile devices, such as smartphones and tablets, have made many pervasive...
The role of gas infrastructure in promoting UK energy security
2012,
Skea Jim
This paper considers whether commercially driven investment in gas infrastructure is...
Impact of carbon intensity and energy security constraints on China's coal import
2012,
Lin Boqiang
Logistic and Gaussian Curves are adopted in this article to predict the coal...
Digital certificate management: Optimal pricing and CRL releasing strategies
2014,
Zhang Jie
The fast growth of e‐commerce and online activities places increasing needs for...
IT security auditing: A performance evaluation decision model
2014,
Herath Hemantha S B
Compliance with ever‐increasing privacy laws, accounting and banking...
Institutional Influences on Information Systems Security Innovations
2012,
Lee Jae-Nam
This research investigates information security management as an administrative...
The Association Between the Disclosure and the Realization of Information Security Risk Factors
2013,
Kannan Karthik N
Firms often disclose information security risk factors in public filings such as...
Assessing energy supply security: Outage costs in private households
2011,
Praktiknjo Aaron J
The objective of this paper is to contribute to the topic of energy supply security by...
China's energy security, the Malacca dilemma and responses
2011,
Zhang ZhongXiang
China's rapid economic growth has led to a huge increase in oil imports. This has...
The security of energy infrastructure and supply in North Africa: Hydrocarbons and renewable energies in comparative perspective
2011,
Lacher Wolfram
While security risks to energy infrastructure and supply are frequently cited as a...
Energy, economy and development (EED) triangle: Concerns for India
2011,
Chaturvedi A
In this paper we discuss issues involving energy security with economic growth and...
Energy security and renewable electricity trade–Will Desertec make Europe vulnerable to the ‘energy weapon’?
2011,
Lilliestam Johan
European vulnerability to energy weapon extortion in a Desertec‐style...
Energy security, efficiency and carbon emission of Chinese industry
2011,
Zhang Bo
An assessment is performed from major energy policy perspectives in China. Extensive...
First Page
2
3
4
5
6
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers