نتایج جستجو برای: security evaluation

تعداد نتایج: 991221  

Journal: :Journal of Information Processing and Management 2005

Journal: :Proceedings of National Aviation University 2009

Journal: :Journal of Transportation Technologies 2017

Journal: :The International Conference on Electrical Engineering 2008

2009
S Kalyani

Power System Security is a major concern in real time operation. Conventional method of security evaluation consists of performing continuous load flow and transient stability studies by simulation program. This is highly time consuming and infeasible for on-line application. Pattern Recognition (PR) is a promising tool for on-line security evaluation. This paper proposes a Support Vector Machi...

Journal: :EURASIP J. Wireless Comm. and Networking 2015
Ao Zhou Jinglin Li Qibo Sun Cunqun Fan Tao Lei Fangchun Yang

Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes...

2010
Mohamad El-Abed Romain Giot Baptiste Hemery Christophe Rosenberger

Despite the obvious advantages of biometric authentication systems over traditional security ones (based on tokens or passwords), they are vulnerable to attacks which may considerably decrease their security. In order to contribute in resolving such problematic, we propose a modality-independent evaluation methodology for the security evaluation of biometric systems. It is based on the use of a...

2001
Fredrik Björck

Abstract: The starting point of the study presented here was to scan the literature for information security evaluation methods. The “unit of evaluation” and whishedfor application situation is identified for each of the methods, and these are classified in a basic model. The aim is to support information security practitioners and researchers in their selection of evaluation methods by means o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید