Predictive Security Analyser
نویسنده
چکیده
Version v1.0 Status Final Dissemination Level PP Nature P Keywords predictive security analysis, analysis of process behavior, security monitoring, security assessment tools Reviewers Luigi Coppolino (Epsilon)
منابع مشابه
Cost-effective on-site screening for anaemia in pregnancy in primary care clinics.
OBJECTIVE To determine the feasibility, accuracy and cost of developing a system of on-site screening for anaemia in pregnancy in primary care clinics. SETTING Mobile clinic team in Hlabisa health district, KwaZulu-Natal. METHODS Four hundred and forty-nine consecutive women attending antenatal clinics were screened for anaemia (haemoglobin < 10 g/dl) using copper sulphate solution; the res...
متن کاملPIMA™ point-of-care testing for CD4 counts in predicting antiretroviral initiation in HIV-infected individuals in KwaZulu-Natal, Durban, South Africa
Introduction Limited information is available on the usefulness of the PIMA™ analyser in predicting antiretroviral treatment eligibility and outcome in a primary healthcare clinic setting in disadvantaged communities in KwaZulu-Natal, South Africa. Materials and methods The study was conducted under the eThekwini Health Unit, Durban, KwaZulu-Natal. Comparison of the enumeration of CD4+ T-cell...
متن کاملPCIEF: a policy conflict identification and evaluation framework
Information system security policies have grown in complexity and the emerging collaborative nature of business has created new challenges in creating and managing such policies. These policies address several domains ranging from access control to disaster recovery and depend not only on the business itself but on socio-political/legal requirements as well. Events like collaborative work or pr...
متن کاملProviding Mobile Traffic Analysis As-a-service: Design of a Service-based Infrastructure to Offer High-accuracy Traffic Classifiers Based on Hardware Accelerators
Mobile traffic is significantly growing, thanks to the increased access capacity provided by 3G and 4G technologies and to the rising computing power of the latest smart devices. Due to the widespread diffusion of mobile applications that require and process sensitive customers’ data, mobile traffic is more and more subject to security attacks. Recently, traffic analysis techniques are being su...
متن کاملThe CL-Atse Protocol Analyser
This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w...
متن کامل