نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

Journal: :Encyclopedia 2021

Information security risk assessment is an important part of enterprises’ management practices that helps to identify, quantify, and prioritize risks against criteria for acceptance objectives relevant the organization. Risk refers a process consists identification, management, elimination or reduction likelihood events can negatively affect resources information system reduce potentially have ...

2004
Dah-Jye Lee Pengcheng Zhan Aaron Thomas Robert B. Schoenberger

Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when m...

2009

SAST for security vulnerabilities should be a mandatory requirement for all IT organizations that develop or procure applications. Although the market is relatively new and consolidating, enterprises must adopt SAST technologies and processes because the need is strategic. Enterprises should use a short-term, tactical approach to vendor selection and contract negotiation due to the relative imm...

2000
Hang Liu Anjan Bose Vaithianathan Venkatasubramanian

This paper presents a fast method for use in on-line voltage security assessment. The objective here is to quickly assess the effects of large numbers of contingencies (line outages) to determine the worst case. The methodology is intuitively focused on the relationship between a node voltage and the availability of reactive power in the local neighborhood, and it also takes advantage of other ...

2006
Yonghee Shin

This paper proposes an automated, white-box security testing framework to identify true input manipulation vulnerabilities that can reduce warnings generated by static analysis tools or automated black-box testing tools.

2013
Daniel Schreckling Stephan Huber Focke Höhne Joachim Posegga

URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. This work describes how the detection and analysis of widely distributed and security critical adware plugins is achieved. We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applica...

1999
Weidong Li Lars Wanhammar

The current analysis of low power concentrates mainly on the static analysis. The dynamic aspects, which depends on the data, are less exploited. In this paper, we address some dynamic aspects for low power design.

2005
Xiaoqing Shi Jingzhu Zhao Ouyang Zhiyun Lester R. Brown

Ecological security is an important basis of the entire human security system, the cornerstone for human survival. Knowing the status of ecological security is crucial for making decisions to avoid ecological disaster. Existing research, both the basic research on ecological security mechanism and information service systems, is still primitive in their abilities to resolve eco-security problem...

Journal: :Security Dialogues /Безбедносни дијалози 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید