全部文献期刊会议图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Adéle da Veiga , Liudmila V. Astakhova , Adéle Botha ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.92
摘要:Abstract(#br)The ideal or strong information security culture can aid in minimising the threat of humans to information protection and thereby aid in reducing data breaches or incidents in organisations. This research sets out to understand how information security culture is def...
作者:Christopher Schmitz , Sebastian Pape
来源:[J].Computers & Security(IF 1.158), 2020, Vol.90
摘要:Abstract(#br)Information security risk assessment frameworks support decision-makers in assessing and understanding the risks their organisation is exposed to. However, there is a lack of lightweight approaches. Most existing frameworks require security-related information that a...
作者:Ashleigh Wiley , Agata McCormac , Dragana Calic
来源:[J].Computers & Security(IF 1.158), 2020, Vol.88
摘要:Abstract(#br)The relationship between security culture and Information Security Awareness (ISA) has received preliminary support; however, its interplay with organisational culture is yet to be empirically investigated. Therefore, this study explored the relationship between ISA,...
作者:Edyta Karolina Szczepaniuk , Hubert Szczepaniuk , Tomasz Rokicki ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.90
摘要:Abstract(#br)The aim of the article is to characterise and assess information security management in units of public administration and to define recommended solutions facilitating an increase in the level of information security. The article is considered a theoretical-empirical...
作者:Lijuan Xu , Bailing Wang , Lianhai Wang ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.92
摘要:... In an effort to address these challenges, through the establishing the attack model against PLC in a view of the security incident forensics, this paper proposed a PLC security incident forensics framework named PLC-SEIFF . This framework implemented the automatic constr...
作者:Michael Brunner , Clemens Sauerwein , Michael Felderer ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.92
摘要:Abstract(#br)Information security management aims at ensuring proper protection of information values and information processing systems (i.e. assets). Information security risk management techniques are incorporated to deal with threats and vulnerabilities that impose risks to i...
作者:Seungsoo Lee , Jinwoo Kim , Seungwon Woo ...
来源:[J].Computers & Security(IF 1.158), 2020, Vol.91
摘要:Abstract(#br)As Software-Defined Networking (SDN) is getting popular, its security issue is being magnified as a new controversy, and this trend can be found from recent studies of presenting possible security vulnerabilities in SDN. Understanding the attack surface of SDN is nec...
作者:Muhammad Mudassar Yamin , Basel Katt , Vasileios Gkioulos
来源:[J].Computers & Security(IF 1.158), 2020, Vol.88
摘要:..., through cyber security training. Training can have two forms, the first is directed towards security professionals and aims at improving understanding of the latest threats and increasing skill levels in defending and mitigating against them. The second form of training, whi...
作者:Rainer Diesch , Matthias Pfaff , Helmut Krcmar
来源:[J].Computers & Security(IF 1.158), 2020, Vol.92
摘要:Abstract(#br)Decision-making in the context of organizational information security is highly dependent on various information. For information security managers, not only relevant information has to be clarified but also their interdependencies have to be taken into account. Thus...
作者:Xinwen Hu , Yi Zhuang , Fuyuan Zhang
来源:[J].Computers & Security(IF 1.158), 2020, Vol.88
摘要:Abstract(#br)The existing modeling and verification methods for embedded software are insufficient towards the increasingly prominent security requirements. In this paper, aiming at high security requirements of embedded software, a security modeling and verification framework of...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×