Network and information systems security - Foreword

被引:0
|
作者
Cuppens, F
Debar, H
Bertino, E
机构
[1] GET ENST Bretagne, F-35512 Cesson Sevigne, France
[2] France Telecom, Div R&D, F-14066 Caen 4, France
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
D O I
10.1007/BF03219907
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
引用
收藏
页码:242 / 244
页数:3
相关论文
共 50 条
  • [1] Issues of security and network security in health care information systems
    Patel, A
    Kantzavelou, I
    [J]. TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 216 - 223
  • [2] Neural network technologies for information systems security
    Avedyan, Eduard
    Galushkin, Alexander
    Pantiukhin, Dmitry
    [J]. 2014 SEVENTH IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2014, : 54 - 58
  • [3] EUROPEAN REGULATION ON THE SECURITY OF NETWORK AND INFORMATION SYSTEMS
    Szpor, Grazyna
    [J]. GEOGRAPHIC INFORMATION SYSTEMS CONFERENCE AND EXHIBITION - GIS ODYSSEY 2016, 2016, : 252 - 260
  • [4] Achieving Information Security in Network Computing Systems
    Cunsolo, V. D.
    Distefano, S.
    Puliafito, A.
    Scarpa, M. L.
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 71 - 77
  • [5] Information Systems Security: Cases of Network Administrator Threats
    Jahankhani, Hamid
    Fernando, Shantha
    Nkhoma, Mathews Z.
    Mouratidis, Haralambos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (03) : 13 - 25
  • [6] Introduction to special issue on 'Advances in Information Systems and Network Systems Security'
    Jena, Sanjay K.
    Turuk, Ashok K.
    Sahoo, Manmath N.
    Bakshi, Sambit
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2015, 11 (03) : 153 - 154
  • [7] A Nomological Network Analysis of Research on Information Security Management Systems
    Parra, Fernando
    Hall, Laura L.
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4336 - 4345
  • [8] Neuro-Computing Applications in Security of Network Information Systems
    Yao Min(DepartmeNt of Computer
    [J]. Journal of Systems Engineering and Electronics, 1999, (02) : 65 - 68
  • [9] Using the vulnerability information of computer systems to improve the network security
    Lai, Yeu-Pong
    Hsia, Po-Lun
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (09) : 2032 - 2047
  • [10] Sensor information collection, analysis and network systems for home security
    Roper, WE
    [J]. GEO-SPATIAL AND TEMPORAL IMAGE AND DATA EXPLOITATION III, 2003, 5097 : 90 - 99