X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (37) 37
Journal Article (20) 20
Publication (13) 13
Book Chapter (4) 4
Book / eBook (2) 2
Web Resource (2) 2
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
security (19) 19
computer security (8) 8
computer science (7) 7
computer communication networks (6) 6
information security (6) 6
software engineering (6) 6
cloud computing (5) 5
contracts (5) 5
software (5) 5
computer information security (4) 4
computer programs (4) 4
cyber security (4) 4
data encryption (4) 4
data protection (4) 4
management information systems (4) 4
programming (4) 4
protection (4) 4
safety (4) 4
security requirements (4) 4
service composition (4) 4
software tools (4) 4
threats (4) 4
trustworthiness (4) 4
business (3) 3
computer science, information systems (3) 3
computer science, software engineering (3) 3
computer systems (3) 3
cybersecurity (3) 3
guidelines (3) 3
humans (3) 3
information systems (3) 3
internet (3) 3
risk management (3) 3
runtime (3) 3
service oriented architecture (3) 3
sicherheit (3) 3
slas (3) 3
software security (3) 3
systems and data security (3) 3
unified modeling language (3) 3
air traffic management (2) 2
aircraft (2) 2
application software (2) 2
availability (2) 2
books (2) 2
bpmn (2) 2
cloud (2) 2
collaboration (2) 2
collaborative software (2) 2
communities (2) 2
composite services (2) 2
computer communication systems (2) 2
computer crime (2) 2
computer network security (2) 2
computer networks (2) 2
computer privacy (2) 2
computer system security (2) 2
computers (2) 2
context (2) 2
costs (2) 2
cyber insurance (2) 2
data structures, cryptology and information theory (2) 2
electronic digital computers (2) 2
fallstudie (2) 2
information science (2) 2
maritime communication (2) 2
medical informatics (2) 2
medical services (2) 2
modelling (2) 2
monitoring (2) 2
national security (2) 2
network security, computer (2) 2
ontologies (2) 2
performance evaluation (2) 2
protection of computer systems (2) 2
requirements (2) 2
requirements elicitation (2) 2
reuse (2) 2
risk analysis (2) 2
security measures (2) 2
security of computer networks (2) 2
security of computer systems (2) 2
sicherheitstechnik (2) 2
soa (2) 2
software measurement (2) 2
software safety (2) 2
standards (2) 2
students (2) 2
testing (2) 2
threat (2) 2
usability (2) 2
acceptability (1) 1
acceptance (1) 1
access control (1) 1
aerospace control (1) 1
algorithm analysis and problem complexity (1) 1
ambulatory care information services (1) 1
analysis (1) 1
analytical models (1) 1
anforderungstechnik (1) 1
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), ISSN 2155-7195, 09/2017, Volume 2017-, pp. 1 - 10
Aircraft equipped with satellite communication (SATCOM) systems will enable advanced Air Traffic Management (ATM) operations over datalink on a global basis. A... 
Iris | satellite communication | cyber security | Trajectory | Safety | Security | security requirements | Air Traffic Management | Aircraft | Iris recognition | Aerospace control
Conference Proceeding
IEEE Software, ISSN 0740-7459, 01/2008, Volume 25, Issue 1, pp. 20 - 27
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10547, pp. 89 - 100
Conference Proceeding
IEEE Security & Privacy, ISSN 1540-7993, 11/2015, Volume 13, Issue 6, pp. 38 - 43
To achieve a proper balance between security investments and acceptable loss, businesses take a mixed approach to risk management. In addition to preventive... 
cybercrime | security | Investments | Information security | Risk management | cyberinsurance | Computer security | Computer crime | cybersecurity | cyberattacks | risk analysis | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Balancing | Buying | Risk | Strategy | Security | Acceptability
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2019, Volume 11387, pp. 173 - 191
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8900, pp. 1 - 9
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8900, pp. 10 - 35
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 10744, pp. 38 - 56
Conference Proceeding
2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 06/2019, pp. 1 - 8
Cyber insurance has attracted much attention from both practitioners, policymakers and academics in the past few years. However, it also faces some challenges... 
cyber claims data | cyber coverage | company expectations | threats | cyber insurance
Conference Proceeding
2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 06/2018, pp. 1 - 8
Transferring security risk to a third party through cyber insurance is an unfamiliar playing field for a lot of organisations, and therefore many hesitate to... 
Conference Proceeding
Information and Computer Security, ISSN 2056-4961, 08/2019, Volume 26, Issue 4, pp. 536 - 561
Purpose Within critical-infrastructure industries, bow-tie analysis is an established way of eliciting requirements for safety and reliability concerns.... 
Threats | Network security | Experiments | Shipping industry | Domains | Hypotheses | Students | Data encryption | Health hazards | Design specifications | Digitization | Modelling | Safety | Computer security
Journal Article
International Journal of Secure Software Engineering, ISSN 1947-3036, 04/2013, Volume 4, Issue 2, pp. 1 - 18
The Business Process Modeling Notation (BPMN) has become a popular standard for expressing high level business processes as well as technical specifications... 
Enrichment | Specifications | Run time (computers) | Texts | Complement | Computer information security | Computer programs | Business
Journal Article
International Journal of Secure Software Engineering, ISSN 1947-3036, 04/2014, Volume 5, Issue 2, pp. 1 - 19
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need... 
Space shuttles | Tradeoffs | Air traffic management | Tools | Models | Modelling | Security | Visual
Journal Article
International Journal of Secure Software Engineering, ISSN 1947-3036, 04/2012, Volume 3, Issue 2, pp. 1 - 35
Attack-defense trees can be used as part of threat and risk analysis for system development and maintenance. They are an extension of attack trees with defense... 
Trees | Management systems | Maintenance | Assessments | Computer information security | Computer programs | Decoration | Guidelines
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8900, pp. 50 - 62
Journal Article
2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 06/2018, pp. 1 - 8
For more than a decade, businesses and private citizens alike have been tormented by an online phenomenon that has changed our stance on cyber security.... 
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8900
Journal Article
Electronic Proceedings in Theoretical Computer Science, EPTCS, ISSN 2075-2180, 04/2014, Volume 148, Issue Proc. GraMSec 2014, pp. 1 - 14
EPTCS 148, 2014, pp. 1-14 Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with... 
Conference Proceeding
Studies in Health Technology and Informatics, ISSN 0926-9630, 2007, Volume 129, Issue Pt 1, pp. 3 - 7
Chronic diseases are increasing rapidly and this phenomenon is becoming a major burden to the health delivery system around the world. A new health care... 
systems integration | medical informatics | information systems | continuity of patient care | Information Systems - standards | Humans | Chronic Disease - therapy | Continuity of Patient Care | Systems Integration | Software | Information Systems - organization & administration
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.