نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

Journal: :International Journal of Engineering Applied Sciences and Technology 2020

Journal: :IEEE Transactions on Knowledge and Data Engineering 2014

Journal: :Investment Management and Financial Innovations 2018

Journal: :Mechanical Engineering and Computer Science 2019

Journal: :International Journal of Advanced Computer Science and Applications 2018

2016
Shumei liu

The development of network technology has brought convenience to people's life, but also provides the convenience for the virus, Trojan and other destructive programs to attack the network. Then, the computer network security is becoming more and more dangerous. Accurately and scientifically predict the risk of network, it can effectively prevent the risk, and reduce the loss caused by the prob...

2016
Viacheslav Izosimov Martin Törngren

In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical applicat...

2014
Linyu Xu Hao Yin Zhaoxue Li Shun Li

As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES)...

2005
Paul Kocher

To be secure, tamper resistant cryptographic devices must be protected against DPA and related attacks. Independent testing processes are essential for validating the presence and effectiveness of these countermeasures. Testing methodologies for power analysis vulnerabilities can yield varying degrees of assurance as to the security of the device under test. While insecurity can be demonstrated...

2012
Miodrag J. Mihaljević

This chapter yields a review of certain mathematical approaches for analysis and design of the basic cryptographic elements for establishing information security in information-communication systems. The following two topics are addressed: selected issues on stream ciphers for encryption and key management based on broadcast encryption. Certain coding related issues for security evaluation and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید