3

Information risk assessment, risk analysis and risk management: The IRR research model

Year:
1992
Language:
english
File:
PDF, 685 KB
english, 1992
4

Computer Crime Case Analysis

Year:
2003
Language:
english
File:
PDF, 228 KB
english, 2003
7

Using digital forensics to improve software reliability

Year:
2015
Language:
english
File:
PDF, 497 KB
english, 2015
8

Using Machine Learning to Detect Fake Identities: Bots vs Humans

Year:
2018
Language:
english
File:
PDF, 926 KB
english, 2018
12

Selection process for security packages

Year:
1983
Language:
english
File:
PDF, 404 KB
english, 1983
13

The development of a specification language for a computer security system

Year:
1985
Language:
english
File:
PDF, 489 KB
english, 1985
14

Computer security policy: Important issues

Year:
1988
Language:
english
File:
PDF, 344 KB
english, 1988
15

Framework of a methodology for the life cycle of computer security in an organization

Year:
1989
Language:
english
File:
PDF, 995 KB
english, 1989
16

Computer security methodology: Risk analysis and project definition

Year:
1990
Language:
english
File:
PDF, 760 KB
english, 1990
18

Editorial

Year:
2010
Language:
english
File:
PDF, 98 KB
english, 2010
19

Access Control in Document-centric Workflow Systems — An Agent-based Approach

Year:
2001
Language:
english
File:
PDF, 201 KB
english, 2001
20

Software source code, visual risk analysis: an example

Year:
1998
Language:
english
File:
PDF, 1.56 MB
english, 1998
32

PIDS: a privacy intrusion detection system

Year:
2004
Language:
english
File:
PDF, 101 KB
english, 2004
35

A framework for access control in workflow systems

Year:
2001
Language:
english
File:
PDF, 567 KB
english, 2001