Security scanners in comparative perspective.
نویسنده
چکیده
منابع مشابه
A Comparative Study of Security Council's Dual Standards toward Recent Developments in Libya and Bahrain
With international peace and security covering a broader concept and restriction of governments' authority, issues such as human rights have become intertwined with international peace and security and are no longer an internal issue of governments. It is such that international society may react toward it and make some decisions. What seems important is how Security Council deals with such iss...
متن کاملA User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone
The security analysis of existing QR (Quick Response) code scanners on Android was conducted recently and the result shows that most of those QR code scanners were not able to detect attacks exploiting malicious URLs embedded in QR codes, especially phishing and malware attacks. In our previous study, we proposed a QR code scanner solution called SafeQR that utilized two well-known security API...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملComparative Analysis of China's Energy Geopolitics in the Persian Gulf and Central Asia; With an Eye on Iran’s Position
China, as a rising power, is an important market for fossil fuels. Meantime, the supply of fossil fuels depends on the geopolitical position of the exporting countries. The Persian Gulf and Central Asia are rich regions from an energy perspective. These regions have appropriate locations for supplying the Chinese market. Iran is located between the Persian Gulf and Central Asia. In this article...
متن کاملImproving the Adoption of Dynamic Web Security Vulnerability Scanners
Security vulnerabilities remain present in many web applications despite the improving knowledge base on vulnerabilities. Attackers can exploit such security vulnerabilities to extract critical data from web applications and their users. Many dynamic security vulnerability scanners exist that try to automatically find such security vulnerabilities. We studied the adoption of these tools and fou...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Health matrix
دوره 22 2 شماره
صفحات -
تاریخ انتشار 2013