X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
information security (22) 22
computer science (10) 10
privacy (9) 9
computer security (8) 8
security (8) 8
incident response (7) 7
software engineering (6) 6
cloud computing (5) 5
computer information security (5) 5
data encryption (5) 5
programming (5) 5
software security (5) 5
accountability (4) 4
availability (4) 4
computer communication networks (4) 4
computer science, information systems (4) 4
incident management (4) 4
informationssicherung (4) 4
risk assessment (4) 4
risk management (4) 4
sicherheitstechnik (4) 4
software safety (4) 4
systems and data security (4) 4
[ info ] computer science [cs] (3) 3
access control (3) 3
advanced metering infrastructure (3) 3
application software (3) 3
communications technology (3) 3
computer science, software engineering (3) 3
conferences (3) 3
data structures, cryptology and information theory (3) 3
guidelines (3) 3
information management (3) 3
information systems applications (3) 3
management (3) 3
management of computing and information systems (3) 3
national security (3) 3
norway (3) 3
protection (3) 3
risikoabschätzung (3) 3
risk analysis (3) 3
safety (3) 3
secure software engineering (3) 3
security requirements (3) 3
software (3) 3
software tools (3) 3
software-security (3) 3
[ shs.info ] humanities and social sciences/library and information sciences (2) 2
[info] computer science [cs] (2) 2
[shs.info] humanities and social sciences/library and information sciences (2) 2
access to information (2) 2
coding and information theory (2) 2
cognition (2) 2
communities (2) 2
computer programs (2) 2
computer science, general (2) 2
confidentiality (2) 2
context (2) 2
control systems (2) 2
cyber security (2) 2
databases (2) 2
datensicherheit (2) 2
education (2) 2
energiewirtschaft (2) 2
fallstudie (2) 2
geheimhaltung (2) 2
hospitals (2) 2
humanities and social sciences (2) 2
humans (2) 2
indicators (2) 2
industrial control systems (2) 2
information science (2) 2
information systems (2) 2
information technology (2) 2
internet (2) 2
interviews (2) 2
iso standards (2) 2
learning (2) 2
legislation (2) 2
library and information sciences (2) 2
measurement (2) 2
medical services (2) 2
norwegen (2) 2
organizations (2) 2
personnel (2) 2
portals (2) 2
process control (2) 2
requirements (2) 2
risikomanagement (2) 2
smart grid (2) 2
smart grids (2) 2
software industry (2) 2
stride (2) 2
testing (2) 2
threat modeling (2) 2
zwischenfallreaktion (2) 2
5g mobile communication (1) 1
acceptability (1) 1
ad hoc networks (1) 1
agile development (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Computers & Security, ISSN 0167-4048, 09/2014, Volume 45, pp. 42 - 57
This paper reports results of a systematic literature review on current practice and experiences with incident management, covering a wide variety of... 
Incident management | Systematic review | Incident response | ISO/IEC 27035 | Information security | FRAMEWORK | COMPUTER SCIENCE, INFORMATION SYSTEMS | Literature reviews | Phases | Covering | Management | Information management | Computer information security | Standards
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10547, pp. 89 - 100
Conference Proceeding
Information and Computer Security, ISSN 2056-4961, 2019, Volume 26, Issue 4, pp. 508 - 535
Purpose Today, agile software development teams in general do not adopt security risk-assessment practices in an ongoing manner to prioritize security work.... 
Case study | Protection Poker | Secure software engineering | Risk assessments | Agile development | Software security | Software development | Security | Computer security | Risk assessment | Questionnaires | Software industry
Journal Article
Applied Computing and Informatics, ISSN 2210-8327, 01/2018, Volume 14, Issue 1, pp. 17 - 27
The smart grid vision implies extensive use of ICT in the power system, enabling increased flexibility and functionality and thereby meeting future demands and... 
Power system | Cyber-security | ICT | Reliability | Smart grid | Interdependencies
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2019, Volume 11387, pp. 153 - 172
Conference Proceeding
IEEE Software, ISSN 0740-7459, 01/2008, Volume 25, Issue 1, pp. 20 - 27
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 10027, pp. 679 - 682
Conference Proceeding
Symmetry, ISSN 2073-8994, 04/2018, Volume 10, Issue 4, p. 124
In order to be responsible stewards of other people's data, cloud providers must be accountable for their data handling practices. The potential long provider... 
Requirements | Accountability | Cloud | cloud | requirements | MULTIDISCIPLINARY SCIENCES | accountability | Cloud computing | Chains
Journal Article
IEEE Security & Privacy, ISSN 1540-7993, 11/2015, Volume 13, Issue 6, pp. 38 - 43
To achieve a proper balance between security investments and acceptable loss, businesses take a mixed approach to risk management. In addition to preventive... 
cybercrime | security | Investments | Information security | Risk management | cyberinsurance | Computer security | Computer crime | cybersecurity | cyberattacks | risk analysis | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Balancing | Buying | Risk | Strategy | Security | Acceptability
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9290, pp. 120 - 138
Conference Proceeding
International Journal of Critical Infrastructure Protection, ISSN 1874-5482, 03/2016, Volume 12, pp. 12 - 26
This paper reports on the results of an interview study that surveyed current practices regarding information security incident management in small and large... 
Incident management | Industrial control systems | Incident response | Norway | Information security | Electric power distribution
Journal Article
Computers & Security, ISSN 0167-4048, 09/2014, Volume 45, p. 42
  This paper reports results of a systematic literature review on current practice and experiences with incident management, covering a wide variety of... 
Studies | Data integrity | Information management
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9817, pp. 175 - 190
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 7722, pp. 264 - 275
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 8127, pp. 195 - 207
Conference Proceeding
2012, Lecture Notes in Computer Science, ISBN 3642296149, Volume 7161
This paper presents a solution for visualization control aimed at public displays used in a hospital setting. The solution controls what is displayed on a... 
Systems and Data Security | Data Structures, Cryptology and Information Theory | Data Encryption | Computer Science | Coding and Information Theory | Information Systems Applications (incl. Internet) | Management of Computing and Information Systems
Book Chapter
Cryptography, ISSN 2410-387X, 12/2018, Volume 2, Issue 4, p. 41
Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with... 
cloud computing | accountability | incident response
Journal Article
2012, Lecture Notes in Computer Science, ISBN 3642275842, Volume 7039
Current approaches to privacy policy comparison use strict evaluation criteria (e.g. user preferences) and are unable to state how close a given policy is to... 
Systems and Data Security | Data Encryption | Computer Science | Computers and Society | Information Systems Applications (incl. Internet) | Management of Computing and Information Systems | Computer Communication Networks
Book Chapter
Studies in Health Technology and Informatics, ISSN 0926-9630, 2011, Volume 169, pp. 606 - 610
Large wall-mounted screens placed at locations where health personnel pass by will assist in self-coordination and improve utilisation of both resources and... 
De-identification | Privacy | Personal health information | Coordination | Humans | Access to Information | Systems Integration | Medical Informatics - methods | Hospitals | Confidentiality | Norway | Health Personnel | Patient Identification Systems | Electronic Health Records | Medical Errors - prevention & control | Hospital Information Systems
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 8127, pp. 240 - 255
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.