Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Denise Ferebee"'
Autor:
Candice Titon, Zongmin Wang, Byron Ray, Denise Ferebee, Aukii Franklin, David Agular, Karyn Cole, Chase Q. Wu, Janet Ricks, Vivek Shandilya
Publikováno v:
IPCCC
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics dat
Autor:
Denise Ferebee, Dipankar Dasgupta
Publikováno v:
International Journal of Cyber Warfare and Terrorism. 3:19-31
The cyberspace has become an integral part of modern day life—social, economic, political, religious, medical and other aspects. Without the availability of the Internet today’s businesses, government and society cannot function properly. Moreove
Autor:
Abel Sanchez, Denise Ferebee, Sanjib Kumar Saha, Kul Prasad Subedi, John R. Williams, Alvaro Madero, Dipankar Dasgupta, Abhijit Kumar Nag
Publikováno v:
CICS
Surveys show that more than 80% authentication systems are password based and these systems are increasingly under direct and indirect attacks. In an effort to protect the Positive Authentication System (PAS), the negative authentication concept was
Publikováno v:
InfoSecCD
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and functionalities, both in software and hardware, making it very difficult for users to realize that they are under cyber attack or the cause of data brea
Publikováno v:
CyberSecurity
When a cyber-security event occurs, a person has to answer the following questions: what events are happening, where are the events occurring, and how much damage has occurred or will occur. This paper recommends a cyber-security monitoring system th
Publikováno v:
CICS
Efficient visualization of cyber incidents is the key in securing increasingly complex information infrastructure. Extrapolating security-related information from data from multiple sources can be a daunting task for organizations to maintain safe an
Publikováno v:
CSIIRW
We propose an adaptive cyber security monitoring system that integrates a number of component techniques to collect time-series situation information, perform intrusion detection, and characterize and identify security events so corresponding defense
Publikováno v:
CICS
The timely and reliable data transfer required by many networked applications necessitates the development of comprehensive security solutions to monitor and protect against an increasing number of malicious attacks. However, providing complete cyber
Publikováno v:
International Journal of Information Privacy, Security and Integrity. 2:37
Cyber-security issues affect organisations at all levels. In this article, we will discuss how to apply a visualisation and event correlation tool to facilitate the analysis of data, understanding of data, and dissemination of information to all affe
Autor:
Dipankar Dasgupta, Denise Ferebee
Publikováno v:
IEEE Computational Intelligence Magazine. 3:70-71
This book presents various methods for enhancing the enforcement of computer security. It consists of two parts and nine chapters. Among the topics covered are: basic issues with cyber trust; the need for firewalls; web application security; risk ass