Search results
-
-
Title
-
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
-
Author
-
Rauf, Usman
-
Date Created
-
2020
-
Subjects--Topical
-
Computer science, Information science
-
Description
-
After decades of deploying cyber-security systems, it is a well-known fact that theexisting cyber infrastructure has numerous inherent limitations that not only makethe maintenance of the current network security devices difficult but also provide...
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
-
Author
-
Algarni, Ali
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Co-creation is a form of collaboration in which partners share, improve and blend ideas together to develop a creative product. It helps to share ideas and solve problems in a creative manner. Several co-creativity research works have focused on g...
-
-
Title
-
Evaluating Risk Appeal Approaches Based on PMT Towards Making Secure Decisions
-
Author
-
AL Qahtani, Elham
-
Date Created
-
2023
-
Subjects--Topical
-
Computer science
-
Description
-
To explain changes in users' security behaviors and behavioral intentions, we investigated the different messaging approaches that followed the Protection Motivation Theory (PMT) design guidelines. These messaging approaches were used in different...
-
-
Title
-
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
-
Author
-
AlJarrah, Abeer
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Mobile hybrid apps have the potential to dominate the mobile and IoTs apps market. Cross-platform or hybrid apps are providing a promising development choice that appeals to a great body of developers. This development approach \wraps" standard we...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...