نتایج جستجو برای: security evaluation
تعداد نتایج: 991221 فیلتر نتایج به سال:
IT Security Certification is an increasingly important qualification for information technology (IT) professionals seeking employment in IT security. Yet currently there is a lack of rigorously developed approaches to support the evaluation and selection by key stakeholders of the most appropriate IT security certification scheme from among hundreds of vendor-neutral and vendor-specific schemes...
Assessment and assurance of conformity with regulation documents assumes significant cost in modern economies. Demonstration of compliance with security standards involves providing evidence that the standards’ security criteria are met in full substantiating appropriate decision. Nevertheless despite its importance such type of activity haven't been addressed adequately by the available soluti...
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Apps. For the Apps security evaluation, the paper proceed from the Android permission mechanism, proposes a classified dynamic security evaluation method. Apps security evaluation...
With more and more e-business operating on line, the network and information security problem is not only confined to the concept of network technical systems, but at the same time has special significance beyond network itself, which is economic ties, cultural transmission media, the social operation and management way and so on. Based on the analysis of the security importance and security ev...
Last but not the least, I would like to acknowledge the support and encouragement provided by my family during my Master's studies.
Milk Campaign has played a key role in national strategy of prosperous and vigorous economy in one country, consequently, milk security will have a direct impact on sound mind and body of the nation. By means of accelerating the fuzzy AHP screening index of genetic algorithm and constructing evaluation index system of liquid milk packaging security, the study puts forward the information entrop...
Warning messages are one of the last lines of defense in information security, and are fundamental to users’ security interactions with technology. Unfortunately, research shows that users routinely ignore security warnings. A key contributor to this disregard is habituation, the diminishing of attention through frequent exposure. However, previous research has examined habituation indirectly b...
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
In 2003, Cherukuri et al. proposed Biosec, a novel key distribution protocol where two (implanted) sensors that do not share any secret on beforehand can establish a key through the use of cryptography in combination with biometrics. Their solution makes use of an error correction code to tolerate some errors in the biometrics, and is the first to use patient physiological signals to securely t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید