Predictive Security Analyser

نویسنده

  • Maria Zhdanova
چکیده

Version v1.0 Status Final Dissemination Level PP Nature P Keywords predictive security analysis, analysis of process behavior, security monitoring, security assessment tools Reviewers Luigi Coppolino (Epsilon)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cost-effective on-site screening for anaemia in pregnancy in primary care clinics.

OBJECTIVE To determine the feasibility, accuracy and cost of developing a system of on-site screening for anaemia in pregnancy in primary care clinics. SETTING Mobile clinic team in Hlabisa health district, KwaZulu-Natal. METHODS Four hundred and forty-nine consecutive women attending antenatal clinics were screened for anaemia (haemoglobin < 10 g/dl) using copper sulphate solution; the res...

متن کامل

PIMA™ point-of-care testing for CD4 counts in predicting antiretroviral initiation in HIV-infected individuals in KwaZulu-Natal, Durban, South Africa

Introduction Limited information is available on the usefulness of the PIMA™ analyser in predicting antiretroviral treatment eligibility and outcome in a primary healthcare clinic setting in disadvantaged communities in KwaZulu-Natal, South Africa. Materials and methods The study was conducted under the eThekwini Health Unit, Durban, KwaZulu-Natal. Comparison of the enumeration of CD4+ T-cell...

متن کامل

PCIEF: a policy conflict identification and evaluation framework

Information system security policies have grown in complexity and the emerging collaborative nature of business has created new challenges in creating and managing such policies. These policies address several domains ranging from access control to disaster recovery and depend not only on the business itself but on socio-political/legal requirements as well. Events like collaborative work or pr...

متن کامل

Providing Mobile Traffic Analysis As-a-service: Design of a Service-based Infrastructure to Offer High-accuracy Traffic Classifiers Based on Hardware Accelerators

Mobile traffic is significantly growing, thanks to the increased access capacity provided by 3G and 4G technologies and to the rising computing power of the latest smart devices. Due to the widespread diffusion of mobile applications that require and process sensitive customers’ data, mobile traffic is more and more subject to security attacks. Recently, traffic analysis techniques are being su...

متن کامل

The CL-Atse Protocol Analyser

This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014