نتایج جستجو برای: static security assessment
تعداد نتایج: 833814 فیلتر نتایج به سال:
Propagation analysis is a dynamic code analysis technique that can be used to quantitatively assess certain software properties that are oth erwise di cult to assess such as testability safety and security The currently accepted analysis technique relies heavily on repeated execution of the code being assessed and is therefore very expensive to apply We are currently developing static analysis ...
A static security assessment approach considering electro-thermal coupling of transmission lines is proposed in this paper. Combined with the dynamic thermal rating technology and energy forecasting, the approach can track both the electrical variables and transmission lines’ temperature varying trajectory under anticipated contingencies. Accordingly, it identifies the serious contingencies by ...
This report proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalabl...
Context: Static Application Security Testing (SAST) and Runtime Protection (RASP) are important complementary techniques used for detecting enforcing application-level security policies in web applications. Inquiry: The current state of the art, however, does not allow a safe efficient combination SAST RASP based on shared set policies, forcing developers to reimplement maintain same their enfo...
Background & Objectives : It is not possible to live without using fire. However, fire could destruct human properties in a short time. One of the most important types of fire is intentional fire. This type of fire has become a great problem for insurance companies, fire departments, industries, government and business in the recent years. This study aimed to provide a framework for risk assess...
Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex in...
This paper addresses the ongoing work of decision tree on static security assessment of power systems. In this paper efforts are made to accommodate a new approach Probabilistic Fuzzy Decision Tree (PFDT) with the Decision Tree (DT). Here security assessment classification is discussed and the results compared with the conventional method with different operating point are presented. PFDT exami...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید