Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

4 results
Deposit type : Fulltext
labStructName_s : Computer Security Division
labStructName_s : School of Computing [Malaysia]
Image document

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs

Chen Cao , Lun-Pin Yuan , Anoop Singhal , Peng Liu , Xiaoyan Sun , et al.
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.330-348, ⟨10.1007/978-3-319-95729-6_21⟩
Conference papers hal-01954421v1
Image document

The Determinants of RFID Use and Its Benefits in Hospitals: An Empirical Study Examining Beyond Adoption

Mohammad Alamgir Hossain , Azizah Ahmad
17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.468-479, ⟨10.1007/978-3-030-02131-3_42⟩
Conference papers hal-02274175v1
Image document

Assimilation of Business Intelligence Systems: The Mediating Role of Organizational Knowledge Culture

Azizah Ahmad , Mohammad Alamgir Hossain
17th Conference on e-Business, e-Services and e-Society (I3E), Oct 2018, Kuwait City, Kuwait. pp.480-491, ⟨10.1007/978-3-030-02131-3_43⟩
Conference papers hal-02274198v1
Image document

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds

Nawaf Alhebaishi , Lingyu Wang , Sushil Jajodia , Anoop Singhal
32th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2018, Bergamo, Italy. pp.3-20, ⟨10.1007/978-3-319-95729-6_1⟩
Conference papers hal-01954402v1