Academic literature on the topic 'Metric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Metric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Metric Security"
Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (April 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Full textShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Full textDíaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Full textYee, George O. M. "Designing Sound Security Metrics." International Journal of Systems and Software Security and Protection 10, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Full textShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Full textTjirare, D., and F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia." Namibian Journal for Research, Science and Technology 1, no. 1 (October 16, 2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Full textJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems." International Journal of Organizational and Collective Intelligence 4, no. 3 (July 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi, and Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products." Indian Journal of Science and Technology 8, S8 (April 1, 2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Full textIto, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (December 15, 2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Full textDissertations / Theses on the topic "Metric Security"
Khan, Moazzam. "Security metric based risk assessment." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.
Full textOwusu-Kesseh, Daniel. "The Relative Security Metric of Information Systems: Using AIMD Algorithms." University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1462278857.
Full textKarabey, Bugra. "Attack Tree Based Information Technology Security Metric Integrating Enterprise Objectives With Vulnerabilities." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614100/index.pdf.
Full textErturk, Volkan. "A Framework Based On Continuous Security Monitoring." Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12610139/index.pdf.
Full textRich, Ronald P., and Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.
Full textApproved for public release; distribution is unlimited
A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.
Lieutenant, United States Navy
Lieutenant, United States Navy
Zhou, Luyuan. "Security Risk Analysis based on Data Criticality." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.
Full textHolmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.
Full textThesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textBilal, Muhammad, and Ganesh Sankar. "Trust & Security issues in Mobile banking and its effect on Customers." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3166.
Full textUsing mobile phones for mobile banking, customers can push or pull the details like Funds transfer, Bill payment, Share trade, Check order and also inquiries like Account balance, Account statement and Check status Transaction history etc. It means that the customer is interacting with the files, databases etc., of the bank . Database at the server end is sensitive in terms of security. Customers distrust mobile devices to transfer money or for making any transactions. The reason is that security is a major concern for the customer’s fulfillment. Customer’s main concern in using mobile devices for mobile banking is the authentication method used to ensure that the right person is accessing the services like transaction etc.The authors made a basic model for mobile banking transaction. All security risks were included in the transaction model. Then the authors focused on authentication method. By literature review and interview it was concluded that security can be improved by bio metric methods. The authors focused on different bio-metric mechanism and concluded that fingerprint mechanism is more suitable as it requires less storage capacity in database and identifies the uniqueness of customers. The authors suggest a possible solution by proposing finger-print mechanism model and designed a bio-metric scanning device as a solution through which customer can interact with banking system using their finger-print. The result of workshop shows that bio-metric finger print mechanism is more suitable and secure then other authentication methods for mobile banking.
004531847791
Taylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.
Full textBooks on the topic "Metric Security"
Wang, Lingyu, Sushil Jajodia, and Anoop Singhal. Network Security Metrics. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4.
Full textSecurity metrics: A beginner's guide. New York: McGraw-Hill, 2012.
Find full textMetrics and methods for security risk management. Amsterdam: Syngress/Elsevier, 2010.
Find full textComplete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.
Find full textIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Find full textIT security metrics: A practical framework for measuring security & protecting data. New York: McGraw Hill, 2010.
Find full textP, Halibozek Edward, ed. Security metrics management: How to measure the costs and benefits of security. Burlington, MA: Butterworth-Heinemann, 2006.
Find full textBrotby, W. Krag. Information security management metrics: A definitive guide to effective security monitoring and measurement. Boca Raton: Auerbach Publications, 2009.
Find full textContinuous authentication using biometrics: Data, models, and metrics. Hershey, PA: Information Science Reference, 2012.
Find full textSademies, Anni. Process approach to information security metrics in Finnish industry and state institutions. Espoo [Finland]: VTT Technical Research Centre of Finland, 2004.
Find full textBook chapters on the topic "Metric Security"
Whyte, Mark, and Chris Johnson. "Security and counter-terrorism." In Metric Handbook, 36–1. 7th ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003052586-39.
Full textWhyte, Mark, and Chris Johnson. "Security and counter-terrorism." In Metric Handbook, 683–95. Sixth edition. | New York: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315230726-37.
Full textJØsang, Audun. "A subjective metric of authentication." In Computer Security — ESORICS 98, 329–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055873.
Full textGanesan, Rajesh, Ankit Shah, Sushil Jajodia, and Hasan Cam. "A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center." In Network Security Metrics, 177–207. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_8.
Full textPham, Dang Vinh, and Dogan Kesdogan. "A Combinatorial Approach for an Anonymity Metric." In Information Security and Privacy, 26–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_3.
Full textBouyahia, Tarek, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, and Fabien Autrel. "Metric for Security Activities Assisted by Argumentative Logic." In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 183–97. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9_12.
Full textYahya, Fara, Robert J. Walters, and Gary B. Wills. "Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage." In Enterprise Security, 223–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54380-2_10.
Full textCasola, Valentina, Alessandra De Benedictis, Massimiliano Rak, and Umberto Villano. "A Security Metric Catalogue for Cloud Applications." In Advances in Intelligent Systems and Computing, 854–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61566-0_81.
Full textWang, Lingyu, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia. "An Attack Graph-Based Probabilistic Security Metric." In Lecture Notes in Computer Science, 283–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70567-3_22.
Full textLe Thanh Thai, Binh, and Hidema Tanaka. "A Novel Metric for Password Security Risk Against Dictionary Attacks." In Information Security Applications, 291–302. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25659-2_21.
Full textConference papers on the topic "Metric Security"
Preece, Bradley L., and Eric A. Flug. "A wavelet contrast metric for the targeting task performance metric." In SPIE Defense + Security, edited by Gerald C. Holst and Keith A. Krapels. SPIE, 2016. http://dx.doi.org/10.1117/12.2223855.
Full textMozhaev, Oleksandr, Heorgii Kuchuk, Nina Kuchuk, Mykhailo Mozhaev, and Mykhailo Lohvynenko. "Multiservice network security metric." In 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2017. http://dx.doi.org/10.1109/aiact.2017.8020083.
Full textRodes, Benjamin D., John C. Knight, and Kimberly S. Wasson. "A security metric based on security arguments." In the 5th International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2593868.2593880.
Full textMcIntosh, John C., and Candace E. Clary. "Bistatic SAR imaging geometry performance metric." In Defense and Security, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2004. http://dx.doi.org/10.1117/12.542114.
Full textTupper, Melanie, and A. Nur Zincir-Heywood. "VEA-bility Security Metric: A Network Security Analysis Tool." In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.138.
Full textHashemi, Seyed Mahmood, and Jingsha He. "An evolutionary approach for security metric." In 2015 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2015. http://dx.doi.org/10.1109/ictc.2015.7354776.
Full textChandra, S., and R. A. Khan. "Software security metric identification framework (SSM)." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523250.
Full textŠišejković, Dominik, Rainer Leupers, Gerd Ascheid, and Simon Metzner. "A Unifying logic encryption security metric." In SAMOS XVIII: Architectures, Modeling, and Simulation. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3229631.3229636.
Full textKarabey, Bugra, and Nazife Baykal. "Information security metric integrating enterprise objectives." In 2009 International Carnahan Conference on Security Technology (ICCST). IEEE, 2009. http://dx.doi.org/10.1109/ccst.2009.5335549.
Full textNeto, Afonso Araujo, and Marco Vieira. "Untrustworthiness: A trust-based security metric." In 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/crisis.2009.5411967.
Full textReports on the topic "Metric Security"
Jansen, Wayne. Directions in security metrics research. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.
Full textSwanson, M., N. Bartol, J. Sabato, J. Hash, and L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Full textLippmann, R. P., J. F. Riordan, T. H. Yu, and K. K. Watson. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Fort Belvoir, VA: Defense Technical Information Center, May 2012. http://dx.doi.org/10.21236/ada565825.
Full textMonev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics. Institute of Information and Communication Technologies, March 2014. http://dx.doi.org/10.11610/it4sec.0111.
Full textWayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), May 2008. http://dx.doi.org/10.2172/935471.
Full textBlack, Paul E., Michael Kass, and Elizabeth Fong. Proceedings of workshop on software security assurance tools, techniques, and metrics. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.500-265.
Full textHoaglund, Robert, and Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, January 2007. http://dx.doi.org/10.21236/ada471403.
Full textWilliams, Laurie. On the Use of Software Metrics as a Predictor of Software Security Problems. Fort Belvoir, VA: Defense Technical Information Center, January 2013. http://dx.doi.org/10.21236/ada581470.
Full textBlack, Paul E., and Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, November 2016. http://dx.doi.org/10.6028/nist.sp.500-320.
Full textPerdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, September 2021. http://dx.doi.org/10.46337/210930.
Full text