Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/39194

Registo completo
Campo DCValorIdioma
dc.contributor.authorBorges, Josépor
dc.contributor.authorMartins, Josépor
dc.contributor.authorAndrade, Jorgepor
dc.contributor.authorSantos, Henriquepor
dc.date.accessioned2016-01-04T17:55:39Z-
dc.date.available2016-01-04T17:55:39Z-
dc.date.issued2015-
dc.identifier.isbn978-1-910810-28-6-
dc.identifier.urihttps://hdl.handle.net/1822/39194-
dc.description.abstractInformation security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.por
dc.language.isoengpor
dc.publisherAcademic Conferences and Publishing Internationalpor
dc.rightsopenAccesspor
dc.subjectConceptual model for information securitypor
dc.subjectCase-based reasoningpor
dc.subjectDecision support systempor
dc.subjectMethod of attackpor
dc.subjectInformation security controlspor
dc.titleDesign of a case-based reasoner for information security in military organizationspor
dc.typeconferencePaperpor
dc.peerreviewedyespor
sdum.publicationstatuspublishedpor
oaire.citationStartPage26por
oaire.citationEndPage34por
oaire.citationConferencePlaceHatfield, UKpor
oaire.citationTitleProceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015por
dc.subject.fosCiências Naturais::Ciências da Computação e da Informaçãopor
dc.subject.wosScience & Technologypor
sdum.journalEuropean Conference on Information Warfare and Security, Eccwspor
sdum.conferencePublicationProceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015por
sdum.bookTitlePROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015)por
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
CaseBasedReasoningForInformationSecurity (2Mar15).pdf513,09 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID