نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

Journal: :International Journal for Digital Society 2010

2013
Daniel F. García

Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...

Journal: :journal of agricultural science and technology 2012
x. y. su j. y. wu h. j. zhang z. q. li x. h. sun

china is one of the largest grain producing and consuming nations in the world and the importance of grain security to the chinese can never be overemphasized. in this paper, we present a comprehensive early-warning model for evaluating the status of grain security in china. the model is based on the analytic hierarchy process (ahp) method and the dempster–shafer theory (dst). we divided the ri...

2016
Tyler Thomas Heather Lipford Bill Chu Justin Smith Emerson R. Murphy-Hill

Security vulnerabilities are often accidentally introduced as developers implement code. While there are a variety of existing tools to help detect security vulnerabilities, they are seldom used by developers due to the time or security expertise required. We are investigating techniques integrated within the IDE to help developers detect and mitigate security vulnerabilities. In previous work,...

2009
S Kalyani

Power System Security is a major concern in real time operation. Conventional method of security evaluation consists of performing continuous load flow and transient stability studies by simulation program. This is highly time consuming and infeasible for on-line application. Pattern Recognition (PR) is a promising tool for on-line security evaluation. This paper proposes a Support Vector Machi...

Journal: :Brazilian Journal of Motor Behavior 2015

2012
Joanna Kazmierska

The rapid ageing of the European population poses a challenge for healthcare systems. The incidence of cancers will rise as the number of adults aged 65 years and older increases. Moreover, the health status of individuals in this age group is diverse, and thus requires modern oncology to apply an individualised approach to treatment. There is a clear need to develop and validate health assessm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1389

هدف اصلی از انجام این تحقیق ایجاد یک تست کامپیوتری پویای خواندن یا cdrt می باشد. تستی که در عین حال که ویژگی های سایکومتریک تست (پویایی و روائی) را دارا باشد بتواند مهارت خواندن دانشجویان را به صورت پویا (dynamic) ارزشیابی کند. ارزشیابی پویا(dynamic assessment) که ریشه در تئوری «منطقه تقریبی رشد» یا zpd ویگوتسکی دارد دو هدف اصلی که در ارزشیابی ایستا یا سنتی (static or non-dynamic)توجهی به آن نم...

2010
Saeed Abu-Nimeh Nancy R. Mead

Security risk assessment identifies the threats to systems, while privacy risk assessment identifies data sensitivities in systems. The Security Quality Requirements Engineering (SQUARE) method is used to identify software security issues in the early stages of the development lifecycle. We propose combining the existing security risk assessment techniques in SQAURE with the Privacy Impact Asse...

2014
Kuei-Hu Chang

Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید