Search concepts
|
Selected filters
|
- 1 - 25 out of 4,639 results
Search results
-
Information security as a resource
Blakey, E., Coecke, B., Mislove, M. & Pavlovic, D., May 2013, In: Information and computation. 226, p. 1-2 2 p.Research output: Contribution to journal › Article › Academic
Open AccessFile1 Citation (Scopus)102 Downloads (Pure) -
Deposit and geoenvironmental models for resource exploitation and environmental security : proceedings , Matráháza, Hungary, 6 - 19 September 1998
Fabbri, A. G., Gaal, G. & McCammon, R. B., 2002, Dordrecht etc.: Kluwer Academic. (NATO Science series 2: Environmental security; vol. 80)Research output: Book/Report › Book › Academic
-
Security technologies
Nagenborg, M. H., 2014, Ethics, Science, Technology and Engineering: A Global Resource. Holbrook, J. B. (ed.). 2 ed. Macmillan Reference USA, p. 118-120Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
Open AccessFile144 Downloads (Pure) -
Assessing Security-Critical Energy-Efficient Sensor Networks
Law, Y. W., Dulman, S. O., Etalle, S. & Havinga, P. J. M., Jul 2002, Centre for Telematics and Information Technology (CTIT). 13 p.Research output: Book/Report › Report › Academic
File68 Downloads (Pure) -
Assessing Security in Energy-Efficient Sensor Networks
Law, Y. W., Etalle, S., Dulman, S. O., Hartel, P. H. & Havinga, P. J. M., May 2003, 18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC). Gritzalis, D., De Capitani di Vimercati, S., Samarati, P. & Katsikas, S. K. (eds.). Boston, Massachusetts: Kluwer Academic Publishers, p. 459-463 5 p. (IFIP series; vol. 122).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File146 Downloads (Pure) -
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
Su, X., Bolzoni, D. & van Eck, P., 30 Nov 2006, Enschede: Centre for Telematics and Information Technology (CTIT). 15 p. (CTIT Technical Report Series; no. 06-73)Research output: Book/Report › Report › Professional
File172 Downloads (Pure) -
Urban Water Security Dashboard: systems approach to characterizing the water security of cities
van Ginkel, K. C. H. (Corresponding Author), Hoekstra, A. Y., Buurman, J. & Hogeboom, R. J., 1 Dec 2018, In: Journal of water resources planning and management. 144, 12, 11 p., 04018075.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile53 Citations (Scopus)432 Downloads (Pure) -
Security, concept and history
Nagenborg, M., 2014, Ethics, Science, Technology and Engineering: A Global Resource. Holbrook, J. B. (ed.). 2 ed. Macmillan Reference USA, p. 116-118Research output: Chapter in Book/Report/Conference proceeding › Chapter › Academic › peer-review
Open AccessFile3635 Downloads (Pure) -
Enhancing Resilience in Digital Twins: ASCON-Based Security Solutions for Industry 4.0
El-Hajj, M. & Gebremariam, T. H., Sept 2024, In: Network. 4, 3, p. 260-294 35 p.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile1 Citation (Scopus)15 Downloads (Pure) -
Extended eTVRA vs. Security Checklist: Experiences in a Value-Web
Morali, A., Zambon, E., Houmb, S. H., Sallhammar, K. & Etalle, S., 10 Oct 2008, Enschede: Centre for Telematics and Information Technology (CTIT). 10 p. (CTIT Technical Report Series; no. 10/TR-CTIT-08-62)Research output: Book/Report › Report › Professional
Open AccessFile137 Downloads (Pure) -
A Security Architecture for Personal Networks
Jehangir, A., 9 Apr 2009, Enschede: University of Twente. 166 p.Research output: Thesis › PhD Thesis - Research UT, graduation UT
Open AccessFile432 Downloads (Pure) -
Applying Real Options Thinking to Information Security in Networked Organizations
Daneva, M., 2006, Enschede: Centre for Telematics and Information Technology (CTIT). 11 p. (CTIT Technical Report Series; no. 06-11)Research output: Book/Report › Report › Professional
File250 Downloads (Pure) -
Value-driven Security Agreements in Extended Enterprises
Nunes Leal Franqueira, V. & Wieringa, R. J., 24 Mar 2010, Enschede: Centre for Telematics and Information Technology (CTIT). (CTIT Technical Report Series; no. TR-CTIT-10-17)Research output: Book/Report › Report › Professional
File74 Downloads (Pure) -
TXTing 101: Finding Security Issues in the Long Tail of DNS TXT Records
van der Toorn, O., van Rijswijk-Deij, R., Fiebig, T., Lindorfer, M. & Sperotto, A., Sept 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). Piscataway, NJ: IEEE, p. 544-549 6 p. 9229819Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile8 Citations (Scopus)218 Downloads (Pure) -
Alignment of Organizational Security Policies -- Theory and Practice
Dimkov, T., 23 Feb 2012, Enschede: University of Twente. 211 p.Research output: Thesis › PhD Thesis - Research UT, graduation UT
Open AccessFile700 Downloads (Pure) -
Automated analysis of security requirements through risk-based argumentation
Yu, Y., Nunes Leal Franqueira, V., Tun, T. T., Wieringa, R. J. & Nuseibeh, B., Aug 2015, In: The Journal of systems and software. 106, p. 102-116 15 p.Research output: Contribution to journal › Article › Academic › peer-review
25 Citations (Scopus)91 Downloads (Pure) -
An Overview of Economic Approaches to Information Security Management
Su, X., Jun 2006, Enschede: Centre for Telematics and Information Technology (CTIT). 16 p. (CTIT Technical Report Series; no. 06-30)Research output: Book/Report › Report › Professional
File287 Downloads (Pure) -
Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services
Su, X., Bolzoni, D. & van Eck, P., Oct 2007, Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07). Los Alamitos: IEEE, p. 107-114 8 p. 10.1109/SECUREWARE.2007.42Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File57 Downloads (Pure) -
Engineering security agreements against external insider threat
Nunes Leal Franqueira, V., van Cleeff, A., van Eck, P. & Wieringa, R. J., Oct 2013, In: Information resources management journal. 26, 4, p. 66-91 26 p.Research output: Contribution to journal › Article › Academic › peer-review
7 Citations (Scopus)21 Downloads (Pure) -
Extended eTVRA vs. Security Checklist: Experiences in a Value-Web
Morali, A., Zambon, E., Houmb, S. H., Sallhammar, K. & Etalle, S., 26 Jan 2009, 31st International Conference on Software Engineering - Companion Volume. Los Alamitos: IEEE, p. 130-140 11 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
File1 Citation (Scopus)194 Downloads (Pure) -
Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems
El-Hajj, M. & Beune, P., Jun 2024, In: Information (Switzerland). 15, 6, 304.Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile2 Citations (Scopus)15 Downloads (Pure) -
The Harpoon Security System for Helper Programs on a Pocket Companion
Smit, G. J. M., Havinga, P. J. M. & van Os, D., Sept 1997, 23rd Euromicro Conference: New Frontiers of Information Technology, Budapest, Hungary, September 1-4, 1997. Los Alamitos, CA: IEEE, p. 231-238 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
51 Downloads (Pure) -
Future consumer mobile phone security: a case study using the data centric security model
van Cleeff, A., 2008, University of Twente. 12 p.Research output: Book/Report › Report › Other research output
File6 Citations (Scopus)211 Downloads (Pure) -
Reconciling food security and bioenergy: priorities for action
Kline, K. L., Msangi, S., Dale, V. H., Woods, J., Souza, G. M., Osseweijer, P., Clancy, J. S., Hilbert, J. A., Johnson, F. X., McDonnell, P. C. & Mugera, H. K., Mar 2017, In: Global change biology. Bioenergy. 9, 3, p. 557-576Research output: Contribution to journal › Article › Academic › peer-review
Open AccessFile136 Citations (Scopus)220 Downloads (Pure) -
Resource Management for Seamless Mobile Services
Havinga, P. J. M., Smit, G. J. M., Vognild, L. & Wu, G., 2001, WPMC' 01: Fourth International Symposium on Wireless Personal Multimedia Communications : September 9-12, 2001, Aalborg, Denmark. University of Aalborg, Vol. 3. p. 1205-1210 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
Open AccessFile29 Downloads (Pure)