Sciweavers

39 search results - page 7 / 8
» Incident Management and Incident Response: The Case of Swede...
Sort
View
WSC
2007
15 years 2 months ago
An initial simulation model for aiding policy analysis in urban insurgencies
This paper aims to demonstrate the potential for using the system dynamics computer simulation methodology to gain insight into the evolution of insurgencies. In particular, it ex...
Edward G. Anderson Jr.
75
Voted
NSPW
2006
ACM
15 years 5 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald
IPPS
2006
IEEE
15 years 5 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
86
Voted
SIGUCCS
2000
ACM
15 years 3 months ago
Computer Abuse, Information Technologies and Judicial Affairs
Crime on the Internet has become a formidable challenge for university information technology and student judicial systems. The nature of university computing requires a relativel...
Elizabeth Mackenzie, Kathryn Goldman
EUSFLAT
2009
196views Fuzzy Logic» more  EUSFLAT 2009»
14 years 9 months ago
Organizational Risk Assessment using Adaptive Neuro-Fuzzy Inference System
In this paper a fuzzy model based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is introduced for calculating the level of risk in managerial problems. In this model, affecting ...
Javad J. Jassbi, Sohrab Khanmohammadi