Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 31, Issue 5July, 2012
Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Table Of Content Section
article
article
article
Incident response teams - Challenges in supporting the organisational security function

Incident response is a critical security function in organisations that aims to manage incidents in a timely and cost-effective manner. This research was motivated by previous case studies that suggested that the practice of incident response frequently ...

article
Semantic adaptive microaggregation of categorical microdata

In the context of Statistical Disclosure Control, microaggregation is a privacy-preserving method aimed to mask sensitive microdata prior to publication. It iteratively creates clusters of, at least, k elements, and replaces them by their prototype so ...

article
Taxonomy of compliant information security behavior

This paper aims at surveying the extrinsic and intrinsic motivations that influence the propensity toward compliant information security behavior. Information security behavior refers to a set of core information security activities that have to be ...

article
Securing distributed systems using patterns: A survey

Driven by expanding scientific computing and business enterprise needs, the last decade has seen a shift toward software paradigms in which distribution plays a central role. The increasing size, complexity and heterogeneity of the corresponding systems ...

article
Steganography for MP3 audio by exploiting the rule of window switching

MP3 audio is a promising carrier format for covert communication because of its popularization. In this paper, we propose an MP3 steganographic method by exploiting the rule of window switching during encoding. The method carries out embedding by ...

article
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset

Keystroke Dynamics, which is a biometric characteristic that depends on typing style of users, could be a viable alternative or a complementary technique for user authentication if tolerable error rates are achieved. Most of the earlier studies on ...

article
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis

The increasing number of network attacks causes growing problems for network operators and users. Thus, detecting anomalous traffic is of primary interest in IP networks management and many detection techniques, able to promptly reveal and identify ...

Comments