نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

2016
KULDEEP SAINI AKASH SAXENA

This paper presents a supervising learning approach using Multilayer Feed Forward Neural Network(MFFN) and Radial Basis Fuction Neural Network(RBFN) to deal with fast and accurate static security assessment (SSA) and contingency analysis of a large electric power systems. The degree of severity of contingencies is measured by two scalar performance indices (PIs): Voltage-reactive power performa...

2016
Chao Dai Jianmin Pang Xiaochuan Zhang Guanghui Liang

It is not only important for security analysts to judge some binary code is malicious or not, but also to understand the malware “what to do” and “what’s the impact it posed on our information system”. In this paper, we proposed a novel information fusion model to quantitate the threat of malware. The model consists of three levels: the decision making level information fusion, the attribute le...

2010
Burton S. Kaliski Wayne Pauley

Security and privacy assessments are considered a best practice for evaluating a system or application for potential risks and exposures. Cloud computing introduces several characteristics that challenge the effectiveness of current assessment approaches. In particular, the on-demand, automated, multi-tenant nature of cloud computing is at odds with the static, human process-oriented nature of ...

Journal: :J. Database Manag. 2013
June Wei Binshan Lin Meiga Loho-Noya

This paper developed a method to assess information security risks in e-healthcare. Specifically, it first developed a static E-Healthcare Information Security Risk (EHISR) model to present thirty-three security risk factors by identifying information security threats and their sources in e-healthcare. Second, a dynamic E-Healthcare Information Flow (EHIF) model was developed to logically link ...

Journal: :IEEE Security & Privacy 2004
Brian Chess Gary McGraw

source-code security analysis with static analysis tools. Since ITS4's release in early 2000 (www.cigital.com/its4/), the idea of detecting security problems through source code has come of age. ITS4 is extremely simple—the tool basically scans through a file looking for syntactic matches based on several simple " rules " that might indicate possible security vulnera-bilities (for example, use ...

Journal: :journal of advances in computer research 2014
amin sardeh moghadam behzad moshiri

service availability is important for any organization. this has become more important with the increase of dos attacks. it is therefore essential to assess the threat on service availability. we have proposed a new model for threat assessment on service availability with a data fusion approach. we have selected three more important criteria for evaluating the threat on service availability and...

Deregulation of power system in recent years has changed static security assessment to the major concerns for which fast and accurate evaluation methodology is needed. Contingencies related to voltage violations and power line overloading have been responsible for power system collapse. This paper presents an enhanced radial basis function neural network (RBFNN) approach for on-line ranking of ...

This mixed-methods design study investigated Iranian TOEFL iBT and IELTS teachers’ views on thestructure of the TOEFL iBT and IELTS receptive and productive sections from the yardsticks of dynamic and static assessment. It also examined the conformity level of the receptive and productive sections of TOEFL iBT and IELTS to dynamic assessment and static assessment standards. To achieve the objec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید