Search
Now showing items 1-2 of 2
A risk mitigation approach for autonomous cloud intrusion response system
(
Springer-Verlag Wien
, 2016 , Article)
Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ...
Security behaviors of smartphone users
(
Emerald Group Publishing Ltd.
, 2016 , Article)
Purpose: - This paper aims to report on the information security behaviors of smartphone users in an affuent economy of the Middle East. Design/methodology/approach: - A model based on prior research, synthesized from a ...