نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

2011

Software is an important resource. It contains and controls data and other resources. Thus measures must be taken to protect that data and resources. Thus Software Metrics are measurement of some properties of a piece of software or its specifications. Metrics are very important in Software Quality Measurement. Since Tom De Marco rightly stated “You can’t control what you can’t measure.” Softwa...

2007
Shaolong Zhang Ning Zhou Jiaxing Wu

As enterprises increase their electronic communication in business activities through network, the security of enterprise information system based on EC becomes crucial for enterprises. This paper proposes a fuzzy integrated security evaluation method based on man-computer combined data collection and fuzzy expert evaluation in Delphi method. The method could reduce the subjectivity of expert e...

2015
Hsiu-Chung Wang Ying Zhu Raj Sunderraman Anu Bourgeois

Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This compl...

2010
Levent Ertaul Shalaja Natte Gökay Saldamli

In cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. This paper gives a description of the access security mechanism found in CDMA2000 technology and discusses ho...

2010
PETER G. NEUMANN

This paper considers the problem of attaining computer systems and applications programs that are both highly secure and highly reliable. It contrasts two current alternative approaches, one remedial, the other preventive. A remedial approach is outlined based on a classification of software security violations suggested by Bisbey, Carlstedt, and Hollingworth at lSI. This remedial analysis is t...

Journal: :Occupational medicine 2008
Rob Kok Jan L Hoving Jos H Verbeek Frederieke G Schaafsma Paul B A Smits Frank J H van Dijk

BACKGROUND Evidence-based medicine (EBM), a comprehensive method to support clinical decision making by using evidence, has been instrumental in clinical specialties but not yet in insurance medicine. AIMS We developed and evaluated a workshop on EBM for Dutch social insurance physicians who perform disability evaluations. METHODS Sixty-six social insurance physicians followed a 1-day intro...

2017
Noëlle Rakotondravony Hans P. Reiser

With the increasing number of cyber security visualization tools, literature has repeatedly highlighted the need for a common evaluation framework to help assessing and quantifying the effectiveness of proposed tools and validate their adequacy to targeted usages. However, there is no research yet that supports the development of such framework. We present a work in progress and preliminary ide...

Journal: :International Journal of Applied Mathematics, Electronics and Computers 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید