نتایج جستجو برای: security environment
تعداد نتایج: 678646 فیلتر نتایج به سال:
To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security...
This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling increasing number tasks due to virtualization and technology adoption. The evaluates legacy methods specific VM algorithms Eucalyptus environment compare existing using QoS. also presents a self-adapting security monitoring system infrastructure that takes into account ...
Software security is a major concern for vendors, consumers, and regulators since attackers that exploit vulnerabilities can cause substantial damages. When vulnerabilities are discovered after the software has been sold to consumers, the firms face a dilemma. A policy of disclosing vulnerabilities and issuing updates protects only the consumers who install updates, while the disclosure itself ...
The availability of high performance broadband services from the home will allow a growing number of organisations to offer teleworking as an employee work practice. Teleworking delivers cost savings, improved productivity and provides a recruitment policy to attract and retain personnel. Information security is one of the management considerations necessary before an effective organisational t...
The paper gives an overview on the meta-data specification for administrating and enforcing enterprisewide security for heterogeneous and distributed information systems. The meta-data serves as a basis to maintain enterprise-wide security information centrally, to integrate isolated security specifications, to keep the consistency between different security policies, and to perform access cont...
The perceived lack of security in the wireless environment has delayed many initiatives in providing access to ecommerce applications from wireless devices. Many organizations are skeptical that the same kind of security protections that they are used to in the current Internet (wired) e-commerce environment are also available for wireless transactions. In this paper we will show that these per...
This paper exposes different security threats posed to information in software agent systems. It describes various scenarios in which security can be compromised and highlights the requirements of a standard security-testing environment. This environment is generated using a Security Analysis Tool (SAT) proposed and described in this paper. The tool also fills in the requirement of a much-neede...
Background: Homelessness, as a common phenomenon in all human societies, has many social, psychological, and physical consequences for the homeless and society as a whole. This study aimed to determine the role of psychological and social security in predicting depression among women living in homeless shelters of Tehran. Methods: It was a descriptive correlational study. The research populati...
New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationlization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید