Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,875,462 papers from all fields of science
Search
Sign In
Create Free Account
Computer security incident management
Known as:
Incident response
In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Computer
Incident management
Malware analysis
Security Vision
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Security Incident Information Exchange for Cloud Services
Christian Frøystad
,
Erlend Andreas Gjære
,
Inger Anne Tøndel
,
M. Jaatun
IoTBD
2016
Corpus ID: 29335400
The complex provider landscape in cloud computing makes incident handling difficult, as Cloud Service Providers (CSPs) with end…
Expand
2015
2015
Combining Morphological Analysis and Bayesian Belief Networks: A DSS for Safer Construction of a Smart City
Chadi Aoun
,
S. Fass
,
D. Liginlal
,
Rami Yousef
Americas Conference on Information Systems
2015
Corpus ID: 11120670
Accelerating urban growth has often outpaced the capacity of planners to guide urbanization processes. Despite efforts to create…
Expand
2014
2014
Assessing the expected effects of wildfire on vegetation condition on the Bridger-Teton National Forest, Wyoming, USA
Joe H. Scott
,
Don Helmbrecht
,
Matthew P. Thompson
2014
Corpus ID: 14400674
Characterizing wildfire risk to a fire-adapted ecosystem presents particular challenges due to its broad spatial extent, inherent…
Expand
2013
2013
A Case Study: Preparing for the Smart Grids - Identifying Current Practice for Information Security Incident Management in the Power Industry
M. B. Line
Seventh International Conference on IT Security…
2013
Corpus ID: 12864287
The power industry faces the implementation of smart grids, which will introduce new information security threats to the power…
Expand
2012
2012
ALARM: A modular IT solution to support and evaluate mass casualty incident (MCI) management
R. Lawatscheck
,
S. Düsterwald
,
Carsten Wirth
,
Torsten Schröder
International Conference on Information Systems…
2012
Corpus ID: 18268821
ALARM is a modular IT-solution to support emergency medical service (EMS) providers and rescue staff in mass casualty incident…
Expand
2011
2011
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
T. Chou
2011
Corpus ID: 114377505
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email…
Expand
2007
2007
Teleteaching approach for sensor-based arc welding telerobotic system
Hai Chao Li
,
Hongming Gao
,
Lin Wu
Industrial robot
2007
Corpus ID: 206371638
Purpose – This paper aims to develop a performing approach for telerobotic arc welding in an unstructured environment.Design…
Expand
Review
2004
Review
2004
Application Of Formal Methods To Root Cause Analysis of Digital Incidents
Peter Stephenson
International Journal of Digital Evidence
2004
Corpus ID: 34415058
Numerous current regulations and standards mandate incident response for virtually all segments of the private sector. According…
Expand
2004
2004
Network security hacks
A. Lockhart
2004
Corpus ID: 5582108
To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent…
Expand
1999
1999
Requirements Evolution and Reuse Using the Systems Engineering Process Activities (SEPA)
K. S. Barber
,
T. Graser
,
Paul S. Grisham
,
S. R. Jernigan
Australasian Journal of Information Systems
1999
Corpus ID: 6353198
As more organizations attempt to reuse previous development efforts and incorporate legacy systems, typical software development…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE