Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Frincke, Deborah A."'
Publikováno v:
In Digital Investigation 2007 4 Supplement:101-104
Autor:
Cunningham, Robert, Carleton, Anita D., Longstaff, Tom, Shull, Forrest J., Frincke, Deborah A.
Publikováno v:
IEEE Security & Privacy; Nov/Dec2021, Vol. 19 Issue 6, p8-14, 7p
Publikováno v:
Technology Innovation Management Review. Jun2015, Vol. 5 Issue 6, p45-48. 4p.
Autor:
Frincke, Deborah
Publikováno v:
Journal of Computer Security. 2002, Vol. 10 Issue 1/2, p1. 3p.
Autor:
Bishop, Matt, Engle, Sophie, Frincke, Deborah A, Gates, Carrie, Greitzer, Frank L, Peisert, Sean, Whalen, Sean
Publikováno v:
Bishop, Matt; Engle, Sophie; Frincke, Deborah A; Gates, Carrie; Greitzer, Frank L; Peisert, Sean; et al.(2010). A Risk Management Approach to the 'Insider Threat'. ADVANCES IN INFORMATION SECURITY, 49(7), 115-137. doi: 10.1007/978-1-4419-7133-3. UC Davis: Retrieved from: http://www.escholarship.org/uc/item/9pb9d2jc
ADVANCES IN INFORMATION SECURITY, vol 49
ADVANCES IN INFORMATION SECURITY, vol 49
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an "insider;" indeed, many define it only implicitly. In theory, appropriate selecti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::1f18cb19996336b1c4556a029df251de
http://www.escholarship.org/uc/item/9pb9d2jc
http://www.escholarship.org/uc/item/9pb9d2jc
Autor:
Bishop, Matt, Cummins, Justin, Peisert, Sean, Singh, Anhad, Bhumiratana, Bhume, Agarwal, Deborah, Frincke, Deborah A, Hogarth, Michael
Publikováno v:
Bishop, Matt; Cummins, Justin; Peisert, Sean; Singh, Anhad; Bhumiratana, Bhume; Agarwal, Deborah; et al.(2010). Relationships in Data Sanitization: A Study in Scarlet. Proceedings of the 2010 New Security Paradigms Workshop (NSPW), 2010, 151-164. doi: 10.1145/1900546.1900567. UC Davis: Retrieved from: http://www.escholarship.org/uc/item/56n796pq
Research in data sanitization (including anonymization) emphasizes ways to prevent an adversary from desanitizing data. Most work focuses on using mathematical mappings to sanitize data. A few papers examine incorporation of privacy requirements, eit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______325::1882c66014f9528efe245726af2abb9a
http://www.escholarship.org/uc/item/56n796pq
http://www.escholarship.org/uc/item/56n796pq
Computer security can be used as a vehicle to achieve accreditation goals for computer science and engineering programs, while at the same time engaging students with relevant, exciting topics. The authors' approach, based on educational outcomes, il
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::679b489f4f12c3f66107561c8958fa07
https://hdl.handle.net/10945/7189
https://hdl.handle.net/10945/7189
This paper puts forward a case for an educational initiative in information security at both the undergraduate and graduate levels. Its focus is on the need for such education, the desired educational outcomes, and how the outcomes may be assessed. A
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2778::4ca1042e02e88189b6dcd65365c02bfc
https://hdl.handle.net/10945/15286
https://hdl.handle.net/10945/15286
Publikováno v:
In Computer Networks 8 May 2015 82:1-3
Publikováno v:
IEEE International Professional Communication 2013 Conference; 2013, p1-7, 7p