نتایج جستجو برای: static security assessment
تعداد نتایج: 833814 فیلتر نتایج به سال:
Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodo...
china is one of the largest grain producing and consuming nations in the world and the importance of grain security to the chinese can never be overemphasized. in this paper, we present a comprehensive early-warning model for evaluating the status of grain security in china. the model is based on the analytic hierarchy process (ahp) method and the dempster–shafer theory (dst). we divided the ri...
Security vulnerabilities are often accidentally introduced as developers implement code. While there are a variety of existing tools to help detect security vulnerabilities, they are seldom used by developers due to the time or security expertise required. We are investigating techniques integrated within the IDE to help developers detect and mitigate security vulnerabilities. In previous work,...
Power System Security is a major concern in real time operation. Conventional method of security evaluation consists of performing continuous load flow and transient stability studies by simulation program. This is highly time consuming and infeasible for on-line application. Pattern Recognition (PR) is a promising tool for on-line security evaluation. This paper proposes a Support Vector Machi...
The rapid ageing of the European population poses a challenge for healthcare systems. The incidence of cancers will rise as the number of adults aged 65 years and older increases. Moreover, the health status of individuals in this age group is diverse, and thus requires modern oncology to apply an individualised approach to treatment. There is a clear need to develop and validate health assessm...
طراحی ارزشیابی کامپیوتری پویای خواندن برای دانشجویان ایرانی و مقایسه آن با معادل غیر پویا یا سنتی آن
هدف اصلی از انجام این تحقیق ایجاد یک تست کامپیوتری پویای خواندن یا cdrt می باشد. تستی که در عین حال که ویژگی های سایکومتریک تست (پویایی و روائی) را دارا باشد بتواند مهارت خواندن دانشجویان را به صورت پویا (dynamic) ارزشیابی کند. ارزشیابی پویا(dynamic assessment) که ریشه در تئوری «منطقه تقریبی رشد» یا zpd ویگوتسکی دارد دو هدف اصلی که در ارزشیابی ایستا یا سنتی (static or non-dynamic)توجهی به آن نم...
Security risk assessment identifies the threats to systems, while privacy risk assessment identifies data sensitivities in systems. The Security Quality Requirements Engineering (SQUARE) method is used to identify software security issues in the early stages of the development lifecycle. We propose combining the existing security risk assessment techniques in SQAURE with the Privacy Impact Asse...
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید