Energy Internet Security Risk Evaluation Index System
نویسندگان
چکیده
منابع مشابه
Internet based Evaluation System
In this paper, we describe the design and development of a web-based Computerized Adaptive Testing system (CAT) that is still under development and will be one of the main components of the TREE project. The TREE project consists in the development of a several web-based tools for the classification and identification of different European vegetable species (an expert system, interfaces for cre...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملinternet security
generally, this article deals with the challenges and solutions facing the internet security. first, the article discusses the following subjects: the security of communication and information networks, the importance of the networks, the networks security precedence internet and computers crimes, the beginning of computer crimes, classifying computer crimes as well as the solutions proposed to...
متن کاملSecurity Evaluation Expert System
Software is an important resource. It contains and controls data and other resources. Thus measures must be taken to protect that data and resources. Thus Software Metrics are measurement of some properties of a piece of software or its specifications. Metrics are very important in Software Quality Measurement. Since Tom De Marco rightly stated “You can’t control what you can’t measure.” Softwa...
متن کاملComputer system security evaluation
This paper considers the problem of attaining computer systems and applications programs that are both highly secure and highly reliable. It contrasts two current alternative approaches, one remedial, the other preventive. A remedial approach is outlined based on a classification of software security violations suggested by Bisbey, Carlstedt, and Hollingworth at lSI. This remedial analysis is t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Earth and Environmental Science
سال: 2021
ISSN: 1755-1315
DOI: 10.1088/1755-1315/645/1/012045