Sciweavers

405 search results - page 22 / 81
» Avatar-centric Risk Evaluation
Sort
View
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
15 years 4 months ago
Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Frederick T. Sheldon, Robert K. Abercrombie, Ali M...
HASE
2008
IEEE
14 years 10 months ago
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value
Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint an...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
WWW
2011
ACM
14 years 4 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
94
Voted
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
15 years 3 months ago
A Greedy Strategy for Tracking a Locally Predictable Target among Obstacles
— Target tracking among obstacles is an interesting class of motion planning problems that combine the usual motion constraints with robot sensors’ visibility constraints. In t...
Tirthankar Bandyopadhyay, Yuanping Li, Marcelo H. ...
ISI
2004
Springer
15 years 3 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...