Sciweavers

247 search results - page 19 / 50
» Infrastructure Risk Reduction
Sort
View
RE
2010
Springer
14 years 4 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa
ICNC
2005
Springer
15 years 3 months ago
Support Vector Based Prototype Selection Method for Nearest Neighbor Rules
The Support vector machines derive the class decision hyper planes from a few, selected prototypes, the support vectors (SVs) according to the principle of structure risk minimizat...
Yuangui Li, Zhonghui Hu, Yunze Cai, Weidong Zhang
BDIM
2007
IEEE
72views Business» more  BDIM 2007»
15 years 3 months ago
Elevating the Discussion on Security Management: The Data Centric Paradigm
— Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resourc...
Tyrone Grandison, Marcel Bilger, L. O'Connor, M. G...
IFIP
2007
Springer
15 years 3 months ago
Securing Current and Future Process Control Systems
Process control systems (PCSs) are instrumental to the safe, reliable and efficient operation of many critical infrastructure components. However, PCSs increasingly employ commodit...
Robert K. Cunningham, Steven Cheung, Martin W. Fon...
HICSS
2005
IEEE
370views Biometrics» more  HICSS 2005»
15 years 3 months ago
Strategic Information Technology Management: Managing Organizational, Political, and Technological Forces
This paper explores the role of Information Technology (IT) in the management of municipally-owned and operated public utilities. Through semi-structured interviews of senior mana...
Keith Schildt, Suzanne Beaumaster, Marcie Edwards