نتایج جستجو برای: security evaluation
تعداد نتایج: 991221 فیلتر نتایج به سال:
Software is an important resource. It contains and controls data and other resources. Thus measures must be taken to protect that data and resources. Thus Software Metrics are measurement of some properties of a piece of software or its specifications. Metrics are very important in Software Quality Measurement. Since Tom De Marco rightly stated “You can’t control what you can’t measure.” Softwa...
As enterprises increase their electronic communication in business activities through network, the security of enterprise information system based on EC becomes crucial for enterprises. This paper proposes a fuzzy integrated security evaluation method based on man-computer combined data collection and fuzzy expert evaluation in Delphi method. The method could reduce the subjectivity of expert e...
Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This compl...
In cellular industry, security has been a major concern for both service providers and subscribers. Service providers are primarily concerned with security to prevent fraudulent operations such as cloning or subscription fraud, while subscribers are mainly concerned with privacy issues. This paper gives a description of the access security mechanism found in CDMA2000 technology and discusses ho...
This paper considers the problem of attaining computer systems and applications programs that are both highly secure and highly reliable. It contrasts two current alternative approaches, one remedial, the other preventive. A remedial approach is outlined based on a classification of software security violations suggested by Bisbey, Carlstedt, and Hollingworth at lSI. This remedial analysis is t...
BACKGROUND Evidence-based medicine (EBM), a comprehensive method to support clinical decision making by using evidence, has been instrumental in clinical specialties but not yet in insurance medicine. AIMS We developed and evaluated a workshop on EBM for Dutch social insurance physicians who perform disability evaluations. METHODS Sixty-six social insurance physicians followed a 1-day intro...
With the increasing number of cyber security visualization tools, literature has repeatedly highlighted the need for a common evaluation framework to help assessing and quantifying the effectiveness of proposed tools and validate their adequacy to targeted usages. However, there is no research yet that supports the development of such framework. We present a work in progress and preliminary ide...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید