نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

1997
David Byers Mariam Kamkar

Propagation analysis is a dynamic code analysis technique that can be used to quantitatively assess certain software properties that are oth erwise di cult to assess such as testability safety and security The currently accepted analysis technique relies heavily on repeated execution of the code being assessed and is therefore very expensive to apply We are currently developing static analysis ...

2013
Mengxia Wang Hongbin Sun Jinxin Huang Qiang Zhang

A static security assessment approach considering electro-thermal coupling of transmission lines is proposed in this paper. Combined with the dynamic thermal rating technology and energy forecasting, the approach can track both the electrical variables and transmission lines’ temperature varying trajectory under anticipated contingencies. Accordingly, it identifies the serious contingencies by ...

2005
Benjamin Livshits Monica S. Lam

This report proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalabl...

Journal: :The art, science, and engineering of programming 2021

Context: Static Application Security Testing (SAST) and Runtime Protection (RASP) are important complementary techniques used for detecting enforcing application-level security policies in web applications. Inquiry: The current state of the art, however, does not allow a safe efficient combination SAST RASP based on shared set policies, forcing developers to reimplement maintain same their enfo...

زمان پرور, علیرضا, شکوهی پور, امیر, محمدفام, ایرج,

Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...

2013
P. BERAUD A. AHMAD

Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex in...

2016
Sonali Nandanwar

This paper addresses the ongoing work of decision tree on static security assessment of power systems. In this paper efforts are made to accommodate a new approach Probabilistic Fuzzy Decision Tree (PFDT) with the Decision Tree (DT). Here security assessment classification is discussed and the results compared with the conventional method with different operating point are presented. PFDT exami...

Journal: :IEEE Transactions on Industrial Informatics 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید