نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

2007
Nicholas J.A. Tate Matthew J. Warren

IT Security Certification is an increasingly important qualification for information technology (IT) professionals seeking employment in IT security. Yet currently there is a lack of rigorously developed approaches to support the evaluation and selection by key stakeholders of the most appropriate IT security certification scheme from among hundreds of vendor-neutral and vendor-specific schemes...

2015
Oleksandr Potii Oleg Illiashenko Dmitry Komin

Assessment and assurance of conformity with regulation documents assumes significant cost in modern economies. Demonstration of compliance with security standards involves providing evidence that the standards’ security criteria are met in full substantiating appropriate decision. Nevertheless despite its importance such type of activity haven't been addressed adequately by the available soluti...

B. Farnoushfar, , B. Minaei, , M. Nasiri, , N. Najafli, ,

Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...

2015
Hao Wang Tao Li Tong Zhang Jie Wang

It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Apps. For the Apps security evaluation, the paper proceed from the Android permission mechanism, proposes a classified dynamic security evaluation method. Apps security evaluation...

Journal: :JCP 2009
Shaomei Yang Donglei Liu Zhibin Liu

With more and more e-business operating on line, the network and information security problem is not only confined to the concept of network technical systems, but at the same time has special significance beyond network itself, which is economic ties, cultural transmission media, the social operation and management way and so on. Based on the analysis of the security importance and security ev...

2007
Aniruddha Gokhale Swapna Gokhale

Last but not the least, I would like to acknowledge the support and encouragement provided by my family during my Master's studies.

2013
Fang Wang Huaxi Chen

Milk Campaign has played a key role in national strategy of prosperous and vigorous economy in one country, consequently, milk security will have a direct impact on sound mind and body of the nation. By means of accelerating the fuzzy AHP screening index of genetic algorithm and constructing evaluation index system of liquid milk packaging security, the study puts forward the information entrop...

2014
Bonnie Brinton Anderson Tony Vance C. Brock Kirwan David Eargle Seth Howard

Warning messages are one of the last lines of defense in information security, and are fundamental to users’ security interactions with technology. Unfortunately, research shows that users routinely ignore security warnings. A key contributor to this disregard is habituation, the diminishing of attention through frequent exposure. However, previous research has examined habituation indirectly b...

M. R. Aghamohammadi,

This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....

2016
Eduard Marin Dave Singelée Bart Preneel

In 2003, Cherukuri et al. proposed Biosec, a novel key distribution protocol where two (implanted) sensors that do not share any secret on beforehand can establish a key through the use of cryptography in combination with biometrics. Their solution makes use of an error correction code to tolerate some errors in the biometrics, and is the first to use patient physiological signals to securely t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید