Search results
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
-
Author
-
Algarni, Ali
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Co-creation is a form of collaboration in which partners share, improve and blend ideas together to develop a creative product. It helps to share ideas and solve problems in a creative manner. Several co-creativity research works have focused on g...
-
-
Title
-
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
-
Author
-
AlJarrah, Abeer
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Mobile hybrid apps have the potential to dominate the mobile and IoTs apps market. Cross-platform or hybrid apps are providing a promising development choice that appeals to a great body of developers. This development approach \wraps" standard we...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...