Zobrazeno 1 - 10
of 147
pro vyhledávání: '"Audun Jøsang"'
Autor:
Touhid Bhuiyan, Audun Josang
Publikováno v:
International Journal of Engineering Business Management, Vol 2, Iss 1, Pp 23-28 (2010)
Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenom
Externí odkaz:
https://doaj.org/article/e87321f9b481452b8d2eeb9e892ee23a
Publikováno v:
Information, Vol 14, Iss 1, p 16 (2022)
Network traffic data analysis is important for securing our computing environment and data. However, analyzing network traffic data requires tremendous effort because of the complexity of continuously changing network traffic patterns. To assist the
Externí odkaz:
https://doaj.org/article/3073b640256e41c7ab21cc5f20be839c
Autor:
Xujiang Zhao, Xuchao Zhang, Chen Zhao, Jin-Hee Cho, Lance Kaplan, Dong Hyun Jeong, Audun Jøsang, Haifeng Chen, Feng Chen
Publikováno v:
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
Autor:
Lilly Pijnenburg Muller, Siri Bromander, Fredrik Borg, Audun Jøsang, Martin Eian, Geir Skjotskift, Morton Swimmer
Publikováno v:
Digital Threats: Research and Practice. 3:1-22
For a strong, collective defense in the digital domain we need to produce, consume, analyze and share cyber threat intelligence. With an increasing amount of available information, we need automation in order to be effective. We present the results f
Publikováno v:
Information Security Education. Information Security in Action
Information Security Education. Information Security in Action ISBN: 9783030592905
WISE
IFIP Advances in Information and Communication Technology
13th IFIP World Conference on Information Security Education (WISE)
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.142-155, ⟨10.1007/978-3-030-59291-2_10⟩
Information Security Education. Information Security in Action ISBN: 9783030592905
WISE
IFIP Advances in Information and Communication Technology
13th IFIP World Conference on Information Security Education (WISE)
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.142-155, ⟨10.1007/978-3-030-59291-2_10⟩
Part 3: Gaming for Cybersecurity Training; International audience; Agile software development is practiced in most software development projects around the world. To explicitly consider and include security requirements as part of agile software deve
Autor:
Audun Jøsang, László Erdődi
Publikováno v:
Acta Polytechnica Hungarica. 17:199-218
Information Security Posture to Organize and Communicate the Information Security Governance Program
Autor:
Dinh Uy Tran, Audun Jøsang
Publikováno v:
Dinh Uy Tran
Information security practice has evolved greatly from being mostly a technical concern to also becoming a concern of executive management. As a result, there are many different frameworks, guidelines and certification programs for information securi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::de076a1ad77881cf3587f3d38755322c
http://hdl.handle.net/10852/98958
http://hdl.handle.net/10852/98958
Publikováno v:
Web Intelligence and Intelligent Agents
The current online community is suffering the lack of trust or confidence on the opinion expressed in the web-based social network where the degree of trust among the members is absent. The members are facing the quality problem in terms of poor qual
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2e9958b3dc1a3d5cf8de2af5d1fab1cd
http://www.intechopen.com/articles/show/title/trust-and-reputation-management-in-web-based-social-network
http://www.intechopen.com/articles/show/title/trust-and-reputation-management-in-web-based-social-network
Autor:
Audun Jøsang
This book gives a complete introduction to cybersecurity and its many subdomains. It's unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases
Publikováno v:
Human-Centric Computing and Information Sciences, Vol 8, Iss 1, Pp 1-20 (2018)
The rapidly increasing pervasiveness and integration of computers in human society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs to develop and use models of humans and