Table of contents
System survivability: a critical security problem
J. Redman, M. Warren, W. HutchinsonThis paper seeks to delve into the concept of determining the survivability of critical infrastructure in society, especially information‐based networks.
Information systems security from a knowledge management perspective
Petros Belsis, Spyros Kokolakis, Evangelos KiountouzisInformation systems security management is a knowledge‐intensive activity that currently depends heavily on the experience of security experts. However, the knowledge dimension of…
Mitigating the mobile agent malicious host problem by using communication patterns
I. Stengel, K.P. Fischer, U. Bleimann, J. StynesThis paper seeks to describe an approach to mitigate the unsoluble malicious host problem.
Dynamic risk management system for the modeling, optimal adaptation and implementation of an ERP system
Ioannis Zafeiropoulos, Kostas Metaxiotis, Dimitris AskounisThis paper aims to deal with the development of a risk management application for the modelling, optimal adaptation and implementation of an ERP system.
An improved two‐tiered strategy to intrusion detection
A.S. Sodiya, H.O.D. LongeA work that combined strategies in designing anomaly‐based instruction detection system (IDS) was described in CSIDS. This new work seeks to improve on CSIDS.
Knowledge management for Chinese medicines: a conceptual model
Iat Long Alex LaiIn the twenty‐first century and under the knowledge economy, knowledge is regarded as an important asset for many organizations. In the area of Chinese medicines, be it a research…