• Nenhum resultado encontrado

Software - Security/Protection

Probabilistic Security Evaluation Software for Bulk Power System Considering Bus Arrangement

Probabilistic Security Evaluation Software for Bulk Power System Considering Bus Arrangement

... probabilistic security evaluation is proposed in this paper. New software named PSD-PRE is developed using Visual FORTRAN and Visual ...probabilistic security considering bus ...by protection ...

6

Effective software-oriented cryptosystem in complex PC security software

Effective software-oriented cryptosystem in complex PC security software

... computer security system COBRA has been used for about seve- ral years in different institutions of Moldova and ...other software. This PC security system imposes no restriction on utilization of any ...

14

A Security-aware Routing Implementation for Dynamic Data Protection in Zone-based MPSoC

A Security-aware Routing Implementation for Dynamic Data Protection in Zone-based MPSoC

... MPSoCs are now target of several attacks [7, 8]. Malicious en- tities profit of the hyper-connectivity of Internet-of-Things (IoT) to download malware onto MPSoCs and infect IPs. Such kind of remote software-based ...

6

Continuous Security Assessment

Continuous Security Assessment

... the software, and it was without any doubt the most crucial of three objectives, this one was what allowed a smooth imple- mentation of the remaining ...of protection added to ...the software, to the ...

170

Cloud computing and security.

Cloud computing and security.

... and software suppliers (as well as in outsourced and own staff), since each of the various components of the system (hardware, software, humans) may potentially compromise the security of ...the ...

8

E-Business Security Architectures

E-Business Security Architectures

... network security is another important aspect that should matter, as most threats come from outside of the organiza- tion, through communication ...VPN, software, which han- dles all the needs of ...

9

Security metrics to evaluate quality of protection

Security metrics to evaluate quality of protection

... automatic software to identify system vulnerabilities and will prepare their attacks based on the information supplied by that kind of software, therefore the number of vulnerabilities report by ...

73

Android Applications Security

Android Applications Security

... applications security is very important taking in account the high number of mobile devices and ...virus software and in the same period the number of mobile applications containing malware on marketplaces ...

9

Advanced Linux Security

Advanced Linux Security

... certain security domains allows most of the security decisions to be made through the TE ...The security context of a process contains a role attribute and also, while they are not actually applied, ...

6

CYBER SECURITY FOR AIRPORTS

CYBER SECURITY FOR AIRPORTS

... Corporate Security Breaches, Spear Phishing, and Social Media ...cyber security standards established for airports in the United States as the existing standards have mainly focused on aircraft Control ...

12

CLOUD COMPUTING SECURITY

CLOUD COMPUTING SECURITY

... a security analysis ...provider security, attacks by a customer or hacker, availability and reliability ...provider security therefore it is essential that it be monitored ...

6

E-Learning Security Models

E-Learning Security Models

... Let us call a “VLE attack surface” – a lot of (the locus) of the possible vulnerabilities of the e- learning security system. Those are – data transmission channels, elements of the LMS, database, software, ...

5

Introdução ao Spring security

Introdução ao Spring security

... package controle; import java.io.IOException; import javax.enterprise.context.SessionScoped; import javax.faces.bean.ManagedBean; import javax.faces.context.ExternalContext; import javax[r] ...

37

Society and Security

Society and Security

... Plecândă deă laă explica iaă teoretic ă aă luiă Tonnies,ă putemă apreciaă c ă individulă voin eiăreflectateănuălucreaz ăînăfolosulăcomunit ii,ăaşaăcumăspuneăDimitrieăGustiă c ă ă procede[r] ...

15

Agonistic security: Transcending (de/re)constructive divides in critical security studies

Agonistic security: Transcending (de/re)constructive divides in critical security studies

... in security studies 15 —in exposing the “dark side” of security, its role in impeding the realization of a democratic politics (see Neal, 2019), and more generally its crucial role in the maintenance of the ...

28

The Art of Security, Human Security and Why China Needs It

The Art of Security, Human Security and Why China Needs It

... A new wave of public investment was allocated to the primary sector, as in the early 90s the abolition of communes had led to the deterioration of health, education and public works in the countryside (Fairbank and ...

136

AUTISTIC CHILDREN PROTECTION SCHEME

AUTISTIC CHILDREN PROTECTION SCHEME

... Social protection with its programs of work from the diagnostics where the defectologist makes a team together with the physician and the psychologists to the systems of rehabilitation institutions where the ...

10

Upconversion Materials for Security Inks

Upconversion Materials for Security Inks

... a security tool, every device provided by the company had a code in which only the fingerprint of the acquired marker exhibits a green light with “Tag08” (supplier name for the commercial nano-marker), despite ...

60

Pattern Based Security Testing

Pattern Based Security Testing

... objetivo testar aplicações de software através das interfaces gráficas usando testes baseados em modelos/padrões [38]. PBGT é composta por cinco componentes principais [2]: PARADIGM, PARADIGM-RE, PARADIGM-TG, ...

75

Show all 6732 documents...

temas relacionados