Semantic Scholar uses AI to extract papers important to this topic.
As many as 400 people may have access to one's personal medical information throughout the typical care process… Expand Information technology executives strive to align the actions of end users with the desired security posture of management and of… Expand This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID… Expand Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically… Expand CyberCIEGE is a high-end, commercial-quality video game developed jointly by Rivermind and the Naval Postgraduate School's Center… Expand A Cognitive Task Analysis (CTA) was performed to investigate the workflow, decision processes, and cognitive demands of… Expand Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be… Expand Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and… Expand Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… Expand