نتایج جستجو برای: static security assessment
تعداد نتایج: 833814 فیلتر نتایج به سال:
Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for acceptance objectives relevant the organization. Risk refers a process consists identification, management, elimination or reduction likelihood events can negatively affect resources information system reduce potentially have ...
Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when m...
SAST for security vulnerabilities should be a mandatory requirement for all IT organizations that develop or procure applications. Although the market is relatively new and consolidating, enterprises must adopt SAST technologies and processes because the need is strategic. Enterprises should use a short-term, tactical approach to vendor selection and contract negotiation due to the relative imm...
This paper presents a fast method for use in on-line voltage security assessment. The objective here is to quickly assess the effects of large numbers of contingencies (line outages) to determine the worst case. The methodology is intuitively focused on the relationship between a node voltage and the availability of reactive power in the local neighborhood, and it also takes advantage of other ...
This paper proposes an automated, white-box security testing framework to identify true input manipulation vulnerabilities that can reduce warnings generated by static analysis tools or automated black-box testing tools.
URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. This work describes how the detection and analysis of widely distributed and security critical adware plugins is achieved. We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applica...
The current analysis of low power concentrates mainly on the static analysis. The dynamic aspects, which depends on the data, are less exploited. In this paper, we address some dynamic aspects for low power design.
Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making decisions to avoid ecological disaster. Existing research, both the basic research on ecological security mechanism and information service systems, is still primitive in their abilities to resolve eco-security problem...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید