Sciweavers

405 search results - page 18 / 81
» Avatar-centric Risk Evaluation
Sort
View
DESRIST
2009
Springer
137views Education» more  DESRIST 2009»
15 years 2 months ago
Situational method engineering for governance, risk and compliance information systems
Against the background of the current financial crisis and an aftermath of increasing regulation, companies enhance and integrate information systems in the areas of risk manageme...
Anke Gericke, Hans-Georg Fill, Dimitris Karagianni...
SIN
2010
ACM
14 years 7 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
CNSM
2010
14 years 6 months ago
Risk management in VoIP infrastructures using support vector machines
Telephony over IP is exposed to multiple security threats. Conventional protection mechanisms do not fit into the highly dynamic, open and large-scale settings of VoIP infrastructu...
Mohamed Nassar, Oussema Dabbebi, Remi Badonnel, Ol...
IJSEKE
2011
141views more  IJSEKE 2011»
14 years 1 months ago
Risk Assessment in Multi-disciplinary (Software+) Engineering Projects
Software systems in safety-critical industrial automation systems, such as power plants and steel mills, become increasingly large, complex, and distributed. For assessing risks, l...
Stefan Biffl, Thomas Moser, Dietmar Winkler
ENGL
2007
160views more  ENGL 2007»
14 years 9 months ago
Diagnosis and Classification of Epilepsy Risk Levels from EEG Signals Using Fuzzy Aggregation Techniques
— This paper is intended to compare the performance of four different types of fuzzy aggregation methods in classification of epilepsy risk levels from EEG Signal parameters. The...
R. Sukanesh, R. Harikumar