نتایج جستجو برای: software countermeasure
تعداد نتایج: 441146 فیلتر نتایج به سال:
For many years large enterprise technology vendors have been seeking to integrate a variety of financial, operational, and performance measurement applications under the broader theme of enterprise (or corporate) performance management (EPM). The combined acquisitions of "best of breed" applications with business intelligence (BI) technology and reporting frameworks all seamlessly integrate bac...
Multi-disciplinary engineering environments, e.g., in automation systems engineering, typically involve different stakeholder groups and engineering disciplines using a variety of specific tools and data models. Defects in individual disciplines can have a major impact on product and process quality in terms of additional cost and effort for defect repair and can lead to project delays. Early d...
6 LIST OF ORIGINAL PAPERS 7 LIST OF ABBREVIATIONS 8 INTRODUCTION 9 AIMS 12 BACKGROUND 13 Sleep 13 A model of sleep regulation 13 Sleep EEG and sleep stages 14 Sleep cycles 15 Sleepiness 16 Definitions 16 Prevalence of sleepiness 17 Sleep deprivation 18 The Circadian rhythm 19 The Sleep debt 20 Shift work and sleepiness 22 The Countermeasures 23 Sleep, naps or breaks as countermeasure 23 Drugs a...
Information leakage of general input operations using button images in graphical user interface on touch screen monitors was experimentally investigated from images reconstructed by receiving the electromagnetic noise. In the experimental investigations for input operations of a personal identification number, it was confirmed that when a button image was touched, the touched button image can b...
In software engineering, risk is usually considered and analyzed during, or even after, the system design. Countermeasures are elaborated and then accommodated as a refinement of the design, when a limited number of changes are still possible and they may introduce the problem of revisiting the initial requirements. In this paper, we propose a goal-oriented approach for modeling and reasoning a...
The effect of a combined system of the bed suction and jet injection as a pier-scour countermeasure on the turbulent flow field is studied in a laboratory flume using an Acoustic Doppler Velocimeter (ADV). The three components of the velocities in the vertical symmetry plane in the equilibrium scour hole in front and rear of the pier under 3-jet injections and bed suction rate Qs/Q0 = 2%located...
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections have already spread. In this paper, we present an innovative collaborative architecture for malware analysis that aims to early detection and timely deployment of countermeasures. The proposed system is a multi-tier arch...
Cryptosystems are highly sensitive to physical attacks, which leads security developers to design more and more complex countermeasures. Nonetheless, no proof of flaw absence has been given for any implementation of these countermeasures. This paper aims to formally verify an implementation of one published countermeasure against fault injection attacks. More precisely, the formal verification ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید