Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,467 papers from all fields of science
Search
Sign In
Create Free Account
Computer security incident management
Known as:
Incident response
In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Computer
Incident management
Malware analysis
Security Vision
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Cuckoo’s Malware Threat Scoring and Classification: Friend or Foe?
Aaron Walker
,
Muhammad Faisal Amjad
,
S. Sengupta
Computing and Communication Workshop and…
2019
Corpus ID: 77386706
Malware threat classification involves understanding the behavior of the malicious software and how it affects a victim host…
Expand
2015
2015
A comparison of windows physical memory acquisition tools
Waqas Ahmed
,
B. Aslam
IEEE Military Communications Conference
2015
Corpus ID: 37207434
Memory forensics analysis is an important area of digital forensics especially in incident response, malware analysis and…
Expand
2014
2014
An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
T. Chen
,
Daniel B. Shore
,
S. Zaccaro
,
R. Dalal
,
L. Tetrick
,
Aiva K. Gorab
IEEE Security and Privacy
2014
Corpus ID: 9249990
Generally, computer security incident response team (CSIRT) managers and team members focus only on individual-level skills. The…
Expand
2014
2014
Assessing the expected effects of wildfire on vegetation condition on the Bridger-Teton National Forest, Wyoming, USA
Joe H. Scott
,
Don Helmbrecht
,
Matthew P. Thompson
2014
Corpus ID: 14400674
Characterizing wildfire risk to a fire-adapted ecosystem presents particular challenges due to its broad spatial extent, inherent…
Expand
2013
2013
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry
M. B. Line
Seventh International Conference on IT Security…
2013
Corpus ID: 12864287
The power industry faces the implementation of smart grids, which will introduce new information security threats to the power…
Expand
2012
2012
ALARM: A modular IT solution to support and evaluate mass casualty incident (MCI) management
R. Lawatscheck
,
S. Düsterwald
,
Carsten Wirth
,
Torsten Schröder
International Conference on Information Systems…
2012
Corpus ID: 18268821
ALARM is a modular IT-solution to support emergency medical service (EMS) providers and rescue staff in mass casualty incident…
Expand
2002
2002
A user level framework for ad hoc routing
J. Allard
,
P. Gonin
,
Minoo Singh
,
G. Richard
27th Annual IEEE Conference on Local Computer…
2002
Corpus ID: 5075663
The availability of inexpensive wireless networking hardware (e.g., based on the IEEE 802.11 standards) has generated interest in…
Expand
2002
2002
GENERATING PERFORMANCE MEASURES FOR PORTLAND'S ARCHIVED ADVANCED TRAFFIC MANAGEMENT SYSTEM DATA
R. Bertini
,
Monica Leal
,
D. Lovell
2002
Corpus ID: 129308178
ABSTRACT Certain performance measures were generated for a freeway corridor in Portland, Oregon (eastbound US 26) using archived…
Expand
1999
1999
Requirements Evolution and Reuse Using the Systems Engineering Process Activities (SEPA)
K. S. Barber
,
T. Graser
,
Paul S. Grisham
,
S. R. Jernigan
Australasian Journal of Information Systems
1999
Corpus ID: 6353198
As more organizations attempt to reuse previous development efforts and incorporate legacy systems, typical software development…
Expand
1978
1978
Suboptimal sequential estimation-detection scheme for Poisson driven linear systems
S. Au
,
A. Haddad
Information Sciences
1978
Corpus ID: 34735816
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE