Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information assurance

Known as: IA 
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Abstract As Cyber-Physical Systems (CPSs) are a class of systems advancing in a number of safety-critical application areas, it… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Cloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Information technology executives strive to align the actions of end users with the desired security posture of management and of… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
CyberCIEGE is a high-end, commercial-quality video game developed jointly by Rivermind and the Naval Postgraduate School's Center… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Review
2005
Review
2005
A Cognitive Task Analysis (CTA) was performed to investigate the workflow, decision processes, and cognitive demands of… Expand
  • table 1
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
 
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… Expand
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Suppose that Bob has a databaseDand that Alice wants to perform a search queryqonD(e.g., “isqinD?”).Since Alice is concerned… Expand
  • figure 1
Is this relevant?
Highly Cited
1987
Highly Cited
1987
Abstract We consider contract enforceability problems in credit transactions and justify a bank as an organizational solution to… Expand
  • figure I
Is this relevant?