Sciweavers

167 search results - page 20 / 34
» Information Security Economics - and Beyond
Sort
View
77
Voted
CHI
2008
ACM
15 years 10 months ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
IHI
2012
285views Healthcare» more  IHI 2012»
13 years 5 months ago
Towards HIPAA-compliant healthcare systems
In healthcare domain, there is a gap between healthcare systems and government regulations such as the Health Insurance Portability and Accountability Act (HIPAA). The violations ...
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu
AUSFORENSICS
2003
14 years 11 months ago
Computer Forensics in the Global Enterprise
The increase in cyber-crime has created the need for security technologies that are always one step ahead of the criminal. Computer forensics and incident response solutions allow...
Melisa Bleasdale, Scott Mann, John Patzakis
RAID
2010
Springer
14 years 8 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 4 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov