نتایج جستجو برای: security evaluation
تعداد نتایج: 991221 فیلتر نتایج به سال:
In this article, we present a mixed qualitative and quantitative approach for evaluation of information technology (IT) security investments. For this purpose, we model security scenarios by using defense trees, an extension of attack trees with countermeasures and we use economic quantitative indexes for computing the defender’s return on security investment and the attacker’s return on attack...
Most of the reoccurring types of security problems can be solved by known mitigations in most software products, preferably as early as possible during development. Representing mitigation knowledge in form of reusable security models will help developers in improving software security and learning from past mistakes. This paper explains six model-based security activities that can be integrate...
This paper presents a formal security policy model for SmartCards with digital signature application. This kind of model is necessary for each evaluation according to Information Technology Security Evaluation Criteria assurance level E4 (Common Criteria level EAL5) and above. Furthermore, we argue that such a model is essential for reasoning about the security of Information Technology compone...
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria f...
Addressing the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security patterns. Security patterns provide encapsulated solutions to specific security problems and can be used to build secure systems by designers with little knowledge of securi...
Three models are established under the multivariate nonlinear regression analysis technology, and on the base of the existing and survey data, which are the double-lane road alignment safety evaluation model, the psychological reaction of driver safety evaluation model and the driving safety comprehensive evaluation model. Then, a quantitative evaluation of the experimental section is made by t...
The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed Fuzzy rules consider two main parameters, which are the length of the maximum period of the key sequence obtained from Linear Feedback Shift Register (LFSR) and the entropy of the result in sequences obtained from differ...
abstract this study evaluates the iranian pre-university english textbook in terms of needs, objectives, content, and methodology. the study was designed on the qualitative- quantitative survey basis using interviews and questionnaires, a researcher-made textbook evaluation checklist and a needs analysis questionnaire. the textbook evaluation questionnaire was used in this study to elicit the ...
Introduction. Different factors can make students interested in studying medicine and cause a positive attitude towards their course of study, or in contrast, lead to their boredom, distraction, and disappointment to continue their education. Thus, this study aims to assess influential factors in the attitude of medical students towards their own discipline. Methods. A survey study was perfor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید