Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Ludwig Englbrecht"'
Publikováno v:
Business & Information Systems Engineering.
Maturity models are valuable management tools for assessing and managing capabilities and therefore creating a basis for their identification, prioritization, and further development. Numerous maturity assessment methods have been developed to suppor
Publikováno v:
Communications in Computer and Information Science ISBN: 9789819902712
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b25bb3f13604f25692651a80d75db67f
https://doi.org/10.1007/978-981-99-0272-9_1
https://doi.org/10.1007/978-981-99-0272-9_1
Publikováno v:
Information & Computer Security. 29:332-349
Purpose In the past, people were usually seen as the weakest link in the IT security chain. However, this view has changed in recent years and people are no longer seen only as a problem, but also as part of the solution. In research, this change is
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783031081712
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f47fe7473221159ea1b8e6efc774aa7e
https://doi.org/10.1007/978-3-031-08172-9_6
https://doi.org/10.1007/978-3-031-08172-9_6
Publikováno v:
Wireless Networks. 26:4895-4907
Increasing IT-security breaches and the extensively growing loss due to fraud-related incidents cause the need for being prepared for a digital investigation. A specific capability maturity model can assist organizations to determine their current st
Autor:
Ludwig Englbrecht, Günther Pernul
Publikováno v:
Journal of Cyber Security and Mobility.
Stricter policies, laws and regulations for companies on the handling of private information arise challenges in the handling of data for Digital Forensics investigations. This paper describes an approach that can meet necessary requirements to condu
Autor:
Ludwig Englbrecht
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ce1fdd5e522fccfa9382b7cff610c5de
https://doi.org/10.1007/978-3-642-27739-9_1679-1
https://doi.org/10.1007/978-3-642-27739-9_1679-1
Publikováno v:
Advances in Digital Forensics XVII ISBN: 9783030883805
Industrial control systems are increasingly targeted by cyber attacks. However, it is difficult to conduct forensic investigations of industrial control systems because taking them offline is often infeasible or expensive. An attractive option is to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1e65321271a0aec6621f2de7133eba8b
https://doi.org/10.1007/978-3-030-88381-2_2
https://doi.org/10.1007/978-3-030-88381-2_2
Autor:
Ludwig Englbrecht
Publikováno v:
Encyclopedia of Cryptography, Security and Privacy ISBN: 9783642277399
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9a95cdf7f66a1d7f8107aa3d973651de
https://doi.org/10.1007/978-3-642-27739-9_1678-1
https://doi.org/10.1007/978-3-642-27739-9_1678-1
Autor:
Ludwig Englbrecht, Günther Pernul
Publikováno v:
IFIP Advances in Information and Communication Technology
13th IFIP World Conference on Information Security Education (WISE)
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.127-141, ⟨10.1007/978-3-030-59291-2_9⟩
Information Security Education. Information Security in Action
Information Security Education. Information Security in Action ISBN: 9783030592905
13th IFIP World Conference on Information Security Education (WISE)
13th IFIP World Conference on Information Security Education (WISE), Sep 2020, Maribor, Slovenia. pp.127-141, ⟨10.1007/978-3-030-59291-2_9⟩
Information Security Education. Information Security in Action
Information Security Education. Information Security in Action ISBN: 9783030592905
Part 3: Gaming for Cybersecurity Training; International audience; Increasing threats in the area of information security raise the necessity for companies to be prepared for a digital forensic investigation. However, even the best investments in tec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f99eb1ec40bf15ba7acbf160d67d2ce9
https://hal.inria.fr/hal-03380703/file/497436_1_En_9_Chapter.pdf
https://hal.inria.fr/hal-03380703/file/497436_1_En_9_Chapter.pdf