Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,212,284 papers from all fields of science
Search
Sign In
Create Free Account
Information assurance
Known as:
IA
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Attack tree
Bachelor of Computer Science
Business continuity
Business continuity planning
Expand
Broader (2)
Computer security
IT risk management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Fuzziness based semi-supervised learning approach for intrusion detection system
Rana Aamir Raza
,
Xizhao Wang
,
J. Huang
,
Haider Abbas
,
Yulin He
Information Sciences
2017
Corpus ID: 205464529
Highly Cited
2010
Highly Cited
2010
Fear Appeals and Information Security Behaviors: An Empirical Study
Allen C. Johnston
,
Merrill Warkentin
MIS Q.
2010
Corpus ID: 27134935
Information technology executives strive to align the actions of end users with the desired security posture of management and of…
Expand
Highly Cited
2007
Highly Cited
2007
Phishing for user security awareness
R. Dodge
,
C. Carver
,
A. J. Ferguson
Computers & security
2007
Corpus ID: 15801449
Highly Cited
2007
Highly Cited
2007
A video game for cyber security training and awareness
Benjamin D. Cone
,
C. Irvine
,
M. Thompson
,
Thuy D. Nguyen
Computers & security
2007
Corpus ID: 1877923
Review
2006
Review
2006
RFID security and privacy: a research survey
A. Juels
IEEE Journal on Selected Areas in Communications
2006
Corpus ID: 2357830
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID…
Expand
Highly Cited
2006
Highly Cited
2006
Dynamic key management in sensor networks
M. Eltoweissy
,
Mohammed A. Moharrum
,
R. Mukkamala
IEEE Communications Magazine
2006
Corpus ID: 2977618
Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically…
Expand
Highly Cited
2005
Highly Cited
2005
CyberCIEGE: Gaming for Information Assurance
C. Irvine
,
M. Thompson
,
K. Allen
IEEE Security and Privacy
2005
Corpus ID: 2988679
CyberCIEGE is a high-end, commercial-quality video game developed jointly by Rivermind and the Naval Postgraduate School's Center…
Expand
Highly Cited
2004
Highly Cited
2004
A method for modeling and quantifying the security attributes of intrusion tolerant systems
B. Madan
,
K. Goseva-Popstojanova
,
K. Vaidyanathan
,
K. Trivedi
Performance evaluation (Print)
2004
Corpus ID: 8446916
Highly Cited
2001
Highly Cited
2001
NIST Special Publication on Intrusion Detection Systems
R. Bace
,
P. Mell
2001
Corpus ID: 60809207
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events…
Expand
Highly Cited
2001
Highly Cited
2001
Intrusion Detection Systems
R. Bace
,
P. Mell
2001
Corpus ID: 66927624
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE