Operations with Degraded Security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Binarization Method for Degraded Document Images with Morphological Operations

In this paper, we propose an effective binarization method for de-graded document images in this paper. This method employs morphological operations throughout its algorithm to suppress uneven illumination in the background region, to detect the character location and to reconstruct text regions. Moreover, a technique for estimating stroke width of characters is introduced to remove noises in a...

متن کامل

A RAID reconfiguration scheme for gracefully degraded operations

One distinct advantage of Redundant Array of Independent Disks (RAID) is fault tolerance. But the performance of a disk array in degraded mode is so poor that no one uses the RAID after failure. Continuous operation of RAID in degraded mode is very important in many real time applications, which can not be interrupted in providing continuous services. In this paper, we propose an efficient arch...

متن کامل

Considerations for Cloud Security Operations

1  Abstract—Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed.

متن کامل

Reliability Analysis of Redundant Repairable System with Degraded Failure

This investigation deals with the transient analysis of the machine repair system consisting of M-operating units operating under the care of single repairman. To improve the system reliability/availability, Y warm standby and S cold standby units are provided to replace the failed units. In case when all spares are being used, the failure of units occurs in degraded fashion. In such situation ...

متن کامل

Sonification in Security Operations Centres: What do Security Practitioners Think?

In Security Operations Centres (SOCs) security practitioners work using a range of tools to detect and mitigate malicious computer-network activity. Sonification, in which data is represented as sound, is said to have potential as an approach to addressing some of the unique challenges faced by SOCs. For example, sonification has been shown to enable peripheral monitoring of processes, which co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Security & Privacy Magazine

سال: 2011

ISSN: 1540-7993

DOI: 10.1109/msp.2011.149