نتایج جستجو برای: مدل breach gui

تعداد نتایج: 129795  

Journal: :IOP Conference Series: Earth and Environmental Science 2020

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

2013
Bao N. Nguyen Atif M. Memon Ashok K. Agrawala Ashok Agrawala Pete Keleher Alan Sussman

Title of dissertation: Testing GUI-based Software with Undetermined Input Spaces Bao N. Nguyen, Doctor of Philosophy, 2013 Dissertation directed by: Professor Atif M. Memon Department of Computer Science University of Maryland, College Park Most software applications feature a Graphical User Interface (GUI) front-end as the main, and often the only, method for the user to interact with the soft...

2009
Dmitry G. Luchinsky Viatcheslav V. Osipov Vadim N. Smelyanskiy Ben Hayashida Joshua McMillin David Shook

MODIFIED) A progress in development of the physics model based diagnostic and prognostic system for solid rocket motors (SRMs) of the new generation of the crew exploration vehicles is reported. The performance model (PM) of the internal ballistics of large segmented SRMs in the regime of steady burning in the presence of the case breach fault is presented. This model takes into account propell...

2018
Safâa Achnak Yannick Griep Tim Vantilborgh

Previous research showed that perceptions of psychological contract (PC) breach have undesirable individual and organizational consequences. Surprisingly, the PC literature has paid little to no attention to the relationship between PC breach perceptions and stress. A better understanding of how PC breach may elicit stress seems crucial, given that stress plays a key role in employees' physical...

Journal: :J. Cybersecurity 2015
Stefan Laube Rainer Böhme

Legislators in many countries enact security breach notification regulation to address a lack of information security. The laws designate authorities to collect breach reports and advise firms. We devise a principal–agent model to analyze the economic effect of mandatory security breach reporting to authorities. The model assumes that firms (agents) have few incentives to unilaterally report br...

2015
Fabio Bisogni

While the discussion about a federal law on data breach notification is ongoing and a rash of large, costly data breaches has galvanized public interest in the issue, this paper investigates on the phenomenon of data breach notification letters. In case of any data breach a company faces a number of dilemmas on how to inform the customers. The choices that a company makes on the missive content...

2012
Zhixing Shen Jinyuan Jia

Graphical user interface (GUI) design is a core part of games development, as it is responsible for the look and feel of a game to players. However, GUI design is often overlooked and also time consuming. This paper presents a novel architecture design of a lightweight extensible GUI framework for games to ease the pains of GUI design. Firstly, the core architecture of the GUI framework is desc...

2016
Rui Chen H. Raghav Rao Rohit Valecha

The existing literature has been silent on individuals’ decision making and reactions in response to data breaches. In 2015, the Office of Personnel Management (OPM) discovered that data of several million Federal employee was stolen in cyber-attacks. Within the context of the OPM breaches, we propose a conceptual model that helps reveal the core decision making process of incident victims in r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید