Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,396,479 papers from all fields of science
Search
Sign In
Create Free Account
Security awareness
Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
19 relations
Access control
CERIAS
Computer
ISO/IEC 27002
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Detecting Phishing Websites Based on the Study of the Financial Industry Webserver Logs
Jun Hu
,
Xiangzhu Zhang
,
+4 authors
H. Meng
International Conference on Information Science…
2016
Corpus ID: 16612656
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate Website server log…
Expand
2015
2015
Model To Prevent Websites From XSS Vulnerabilities
Tejinder Singh Mehta
,
S. Jamwal
2015
Corpus ID: 14586488
As social websites get more and more users across internet, Cross Site Scripting is becoming one of the major problems, which…
Expand
2015
2015
Cyber (In-)security of Industrial Control Systems: A Societal Challenge
E. Luiijf
International Conference on Computer Safety…
2015
Corpus ID: 30070682
Our society and its citizens increasingly depend on the undisturbed functioning of critical infrastructures CI, their products…
Expand
2013
2013
Using System Dynamics to Investigate the Effect of the Information Medium Contact Policy on the Information Security Management
Pei-Chen Sung
,
Chien-Yuan Su
2013
Corpus ID: 55498008
Computer viruses remain the information security threat for business and result a devastating effect on business continuity and…
Expand
2008
2008
Analyzing security and energy tradeoffs in autonomic capacity management
Ítalo F. S. Cunha
,
Itamar Viana
,
João Palotti
,
J. Almeida
,
Virgílio A. F. Almeida
IEEE/IFIP Network Operations and Management…
2008
Corpus ID: 11664632
Capacity management of a hosting infrastructure has traditionally focused only on performance goals. However, the quality of…
Expand
2007
2007
Making Security Awareness Happen
Susan D. Hansche
Information Security Management Handbook, 6th ed.
2007
Corpus ID: 1443949
INTRODUCTION This article focuses on the first step of providing computer and information system security — developing and…
Expand
2007
2007
On the design of more secure software-intensive systems by use of attack patterns
M. Gegick
,
L. Williams
Information and Software Technology
2007
Corpus ID: 182815
2004
2004
Challenges of Peace Operations. Into the 21st Century, Concluding Report 1997-2002.Pearson Peacekeeping Centre. Clementsport, ns, Pearson Peacekeeping Centre, 2002, 295 p.Challenges of Peace…
Jacques Fontanel
2004
Corpus ID: 154407819
2002
2002
Security Awareness - Implementing an Effective Strategy
Chelsa Russell
2002
Corpus ID: 166507103
People are often referred to as the weakest link in an information security program. Through either intentional or accidental…
Expand
1997
1997
The doors are locked but the thieves and vandals are still getting in : A proposal in tort to alleviate corporate America's cyber-crime problem
D. L. Gripman
1997
Corpus ID: 147740745
La legislation concernant le prejudice peut dissuader les pirates. Proposition d'une norme minimale pour la securite des reseaux…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE