نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1391

the major aim of this study was to investigate the relationship between social and cultural capital and efl students’ critical thinking skills. this study takes this relationship in to account to see if people with different sociocultural status are different regarding their critical thinking skills. to this end, 160 university students majoring in english language and literature, english trans...

Journal: :Inf. Manag. Comput. Security 2014
Evandro Alencar Rigon Carla Merkle Westphall Daniel Ricardo dos Santos Carlos Becker Westphall

! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...

Journal: :international journal of smart electrical engineering 2014
mahmood hosseini aliabadi shahram javadi ehsan tafehi amin bakhtiari

this study based on investigation for integration wind power into conventional power system with its impact on fossil fuel generators and their generation management. wind power as environmental friendly energy source can reduce the operational cost of the system due to considering no cost for energizing the generator in comparing with fossil fuel generators. however due to unpredictable nature...

2011
Ryan Speers Sergey Bratus

This thesis analyzes the security of networks built upon the IEEE 802.15.4 standard, specifically in regard to the ability of an attacker to manipulate such networks under real-world conditions. The author presents a set of tools, both hardware and software, that advance the state-of-the-art in reconnaissance and site surveying, intelligent packet generation, and launching of attacks. Specifica...

2011
Andreas Ekelhart

The ever-growing dependence on information technology leads to an increase in expensive information security incidents and failures. While researchers have proposed several approaches to managing information security risks, several shortcomings of existing approaches can still be identified. Complex relationships in the information security domain, error-prone manual application of the informat...

Journal: :IACR Cryptology ePrint Archive 2002
Masahiko Takenaka Takeshi Shimoyama Takeshi Koshiba

In this paper, we give the theoretical analysis of χ attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the novel method of security evaluation against χ attack precisely including key dependency by introducing a technique “Transition Matrix Computing.” On the other hand, the way of security evaluation against χ attack has not been known except the computer ex...

2003
Mass Soldal Lund Folker den Braber Ketil Stølen

Security assessments are costly and time consuming and cannot be carried out from scratch each time a system is updated or modified. This motivates the need for specific methodology addressing the maintenance of assessment results, in particular, and a componentoriented approach to security assessment in general. This paper presents such a methodology in the setting of model-based security asse...

1994
Audun Josang

There is a need for assessing the security of smart cards by an independent third party, specially if multi-application smart cards become reality. Intuitively, the methods to obtain this could be derived from the computer industry where security evaluation already is commonplace, but because of the special properties of smart cards, this seems very diicult. The article discusses the problems r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید