نتایج جستجو برای: security papers
تعداد نتایج: 265761 فیلتر نتایج به سال:
Background: Software testing and software security have become one of the most important parts an application. Many studies explored each these topics but there is a gap wherein relation in general has not been explored. Objective: This study aims to conduct systematic literature review capture current state-of-the-art related security. Methods: The search strategy obtains relevant papers from ...
The Basel II IRB approach revisited: do we use the correct model?
Using filter paper to collect blood from wildlife for antibody analysis can be a powerful technique to simplify the collection, transport, and storage of blood samples. Despite these advantages, there are limited data that detail how long these samples can be stored and how storage conditions affect antibody longevity. We used blood samples collected on filter paper from coyotes experimentally ...
In socio-economic sciences the RePEc network (Research Papers in Economics) has become an essential source for the gathering and the spread of both existing and new economic research. Furthermore, it is currently the largest bibliometric database in economic sciences containing 33 different indicators for more than 30,000 economists. Based on this bibliographic information RePEc calculates well...
This paper studies a model in which some consumers shop on the basis of price alone, without attention to potential differences in product quality. A firm may offer a low-quality product to exploit these inattentive consumers. In the unique symmetric equilibrium of the model, firms choose prices with mixed strategies , similarly to Varian (1980) in which some consumers purchase from a random se...
This document is a brief survey of research literature on vehicular networking. Broadly speaking, research publications on vehicular networking can be grouped into two categories: (i) WAVE (IEEE 802.11p and IEEE 1609.1-1609.4) papers, and (ii) VANET papers. Papers on WAVE mostly assume single-hop V2V, V2I and I2V communications, while the VANET papers focus on multi-hop V2V networks. The sectio...
This document is an evaluation of the ECDSA signature scheme. Our work is based on the analysis of various documents [1, 32, 10, 11], which provide the specification of the scheme, as well as on various research papers related to the scheme. Among these research papers are the original work of Poincheval and Stern [33, 34] investigating the security of El Gamal-like signatures, and the series o...
On this level, an approach is evaluated on the basis of non-executable test cases. For instance, if generated test cases are sequences of non-executable nodes of a transition-based model, then evidence can already be measured (efficiency can, for example, be measured on the basis of a cost or time model). But, the concrete effect of the approach on the deployed system under test cannot be measu...
Cloud computing has become new trend, which many enterprises wants to incorporates in their working. Since it relies on sharing of computing resources rather than having local servers or personal devices to handle applications. Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increased scalability while providing services at different abstra...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید