Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Information assurance

Known as: IA 
Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2010
Review
2010
Introduction As many as 400 people may have access to one's personal medical information throughout the typical care process… Expand
Highly Cited
2010
Highly Cited
2010
Information technology executives strive to align the actions of end users with the desired security posture of management and of… Expand
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Review
2006
Review
2006
  • A. Juels
  • IEEE Journal on Selected Areas in Communications
  • 2006
  • Corpus ID: 2357830
This paper surveys recent technical research on the problems of privacy and security for radio frequency identification (RFID… Expand
  • figure 1
  • figure 2
Highly Cited
2006
Highly Cited
2006
Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically… Expand
Highly Cited
2005
Highly Cited
2005
CyberCIEGE is a high-end, commercial-quality video game developed jointly by Rivermind and the Naval Postgraduate School's Center… Expand
  • figure 1
  • figure 2
  • figure 3
Review
2005
Review
2005
A Cognitive Task Analysis (CTA) was performed to investigate the workflow, decision processes, and cognitive demands of… Expand
  • table 1
  • figure 1
Highly Cited
2004
Highly Cited
2004
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Review
2003
Review
2003
Data mining [Chen et al. 1996] is the process of extracting interesting (non-trivial, implicit, previously unknown and… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • table III
Highly Cited
2001
Highly Cited
2001
Abstract : Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events… Expand
  • figure 4
Highly Cited
2001
Highly Cited
2001
  • figure 4