Journal articles on the topic 'Metric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Metric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (April 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Full textShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Full textDíaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Full textYee, George O. M. "Designing Sound Security Metrics." International Journal of Systems and Software Security and Protection 10, no. 1 (January 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Full textShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Full textTjirare, D., and F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia." Namibian Journal for Research, Science and Technology 1, no. 1 (October 16, 2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Full textJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems." International Journal of Organizational and Collective Intelligence 4, no. 3 (July 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (March 30, 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi, and Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products." Indian Journal of Science and Technology 8, S8 (April 1, 2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Full textIto, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (December 15, 2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Full textAli, Shahbaz, Muhammad Khalid Mahmood, Fairouz Tchier, and F. M. O. Tawfiq. "Classification of Upper Bound Sequences of Local Fractional Metric Dimension of Rotationally Symmetric Hexagonal Planar Networks." Journal of Mathematics 2021 (February 27, 2021): 1–24. http://dx.doi.org/10.1155/2021/6613033.
Full textDelli Priscoli, Francesco, Vincenzo Suraci, Roberto Germanà, Alessandro Giuseppi, Andrea Tortorelli, and Andrea Fiaschetti. "A security metric for assessing the security level of critical infrastructures." International Journal of Critical Computer-Based Systems 10, no. 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.10030622.
Full textTortorelli, Andrea, Andrea Fiaschetti, Alessandro Giuseppi, Vincenzo Suraci, Roberto Germanà, and Francesco Delli Priscoli. "A security metric for assessing the security level of critical infrastructures." International Journal of Critical Computer-Based Systems 10, no. 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.108685.
Full textKhan, Naveed, Jianbiao Zhang, and Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server." Security and Communication Networks 2022 (March 14, 2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.
Full textShi, Fan, Shaofeng Kai, Jinghua Zheng, and Yao Zhong. "XLNet-Based Prediction Model for CVSS Metric Values." Applied Sciences 12, no. 18 (September 7, 2022): 8983. http://dx.doi.org/10.3390/app12188983.
Full textAdamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (December 20, 2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.
Full textWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang, and Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Full textFarid, Farnaz, Seyed Shahrestani, and Chun Ruan. "A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems." International Journal of Interactive Communication Systems and Technologies 9, no. 1 (January 2019): 48–76. http://dx.doi.org/10.4018/ijicst.2019010104.
Full textHu, Hao, Yuling Liu, Hongqi Zhang, and Yuchen Zhang. "Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis." Security and Communication Networks 2018 (August 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/5787102.
Full textNovikova, Evgenia, Elena Doynikova, Diana Gaifulina, and Igor Kotenko. "Construction and Analysis of Integral User-Oriented Trustworthiness Metrics." Electronics 11, no. 2 (January 12, 2022): 234. http://dx.doi.org/10.3390/electronics11020234.
Full textDin, Roshidi, Rosmadi Bakar, Azizan Ismail, Aida Mustapha, and Sunariya Utama. "Evaluation review of effectiveness and security metrics performance on information technology domain." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (November 1, 2019): 1059. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1059-1064.
Full textChubaievskyi, Vitaliy, Valery Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Andrii Blozva, and Boris Gusev. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 16–28. http://dx.doi.org/10.28925/2663-4023.2021.13.1628.
Full textZhang, Jing, Han-ying Hu, Min Tong, and Qing-rong Li. "A Security Metric and Related Security Routing Algorithm Design Based on Trust Model." Journal of Electronics & Information Technology 30, no. 1 (February 17, 2011): 10–15. http://dx.doi.org/10.3724/sp.j.1146.2007.00726.
Full textJekl, Jan, and Jiří Jánský. "Security Challenges and Economic-Geographical Metrics for Analyzing Safety to Achieve Sustainable Protection." Sustainability 14, no. 22 (November 16, 2022): 15161. http://dx.doi.org/10.3390/su142215161.
Full textSharma Gaur, Madhu, and Bhaskar Pant. "Trust Metric based Soft Security in Mobile Pervasive Environment." International Journal of Computer Network and Information Security 6, no. 10 (September 8, 2014): 64–71. http://dx.doi.org/10.5815/ijcnis.2014.10.08.
Full textAgrawal, A. "Software Security Metric Development Framework (An Early Stage Approach)." American Journal of Software Engineering and Applications 2, no. 6 (2013): 150. http://dx.doi.org/10.11648/j.ajsea.20130206.14.
Full textMukherjee, Preetam, and Chandan Mazumdar. "“Security Concern” as a Metric for Enterprise Business Processes." IEEE Systems Journal 13, no. 4 (December 2019): 4015–26. http://dx.doi.org/10.1109/jsyst.2019.2918116.
Full textZonouz, Saman A., Robin Berthier, Himanshu Khurana, William H. Sanders, and Tim Yardley. "Seclius: An Information Flow-Based, Consequence-Centric Security Metric." IEEE Transactions on Parallel and Distributed Systems 26, no. 2 (February 2015): 562–73. http://dx.doi.org/10.1109/tpds.2013.162.
Full textAlmasizadeh, Jaafar, and Mohammad Abdollahi Azgomi. "Mean privacy: A metric for security of computer systems." Computer Communications 52 (October 2014): 47–59. http://dx.doi.org/10.1016/j.comcom.2014.06.009.
Full textPurohit, Neha, Shubhalaxmi Joshi, Milind Pande, and Susan Lincke. "Pragmatic analysis of ECC based security models from an empirical perspective." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 739–58. http://dx.doi.org/10.47974/jdmsc-1749.
Full textRakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks." H&ES Research 15, no. 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.
Full textCasola, Valentina, Antonino Mazzeo, Nicola Mazzocca, and Valeria Vittorini. "A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures." Journal of Computer Security 15, no. 2 (February 5, 2007): 197–229. http://dx.doi.org/10.3233/jcs-2007-15201.
Full textDobrowolski, Zbysław, and Grzegorz Drozdowski. "Does the Net Present Value as a Financial Metric Fit Investment in Green Energy Security?" Energies 15, no. 1 (January 4, 2022): 353. http://dx.doi.org/10.3390/en15010353.
Full textChen, Hongsong, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, and Zhongchuan Fu. "A novel SMP-based survivability evaluation metric and approach in wireless sensor network." Computer Science and Information Systems 16, no. 3 (2019): 733–51. http://dx.doi.org/10.2298/csis180918024c.
Full textYevseiev, Serhii, Oleksandr Milov, Ivan Opirskyy, Olha Dunaievska, Oleksandr Huk, Volodymyr Pogorelov, Kyrylo Bondarenko, Nataliia Zviertseva, Yevgen Melenti, and Bogdan Tomashevsky. "Development of a concept for cybersecurity metrics classification." Eastern-European Journal of Enterprise Technologies 4, no. 4 (118) (August 31, 2022): 6–18. http://dx.doi.org/10.15587/1729-4061.2022.263416.
Full textShen, Danyao, Fengchao Zhu, Zhanpeng Zhang, and Xiaodong Mu. "Radio Frequency Fingerprint Identification Based on Metric Learning." International Journal of Information Technologies and Systems Approach 16, no. 3 (April 13, 2023): 1–13. http://dx.doi.org/10.4018/ijitsa.321194.
Full textPark, Ui Hyun, Jeong-hyeop Hong, Auk Kim, and Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust." Electronics 12, no. 8 (April 18, 2023): 1906. http://dx.doi.org/10.3390/electronics12081906.
Full textRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan, and Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network." Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Full textLau, Terry Shue Chien, and Chik How Tan. "On the design and security of Lee metric McEliece cryptosystems." Designs, Codes and Cryptography 90, no. 3 (January 18, 2022): 695–717. http://dx.doi.org/10.1007/s10623-021-01002-2.
Full textRajaSekhar, K., L. S. S. Reddy, and U. J. Kameswari. "Secure System of Attack Patterns towards Application Security Metric Derivation." International Journal of Computer Applications 53, no. 1 (September 25, 2012): 11–18. http://dx.doi.org/10.5120/8384-1987.
Full textSchwartau, Winn. "Network Security It’s About Time: An Offer for a Metric." Network Security 2001, no. 8 (August 2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)00815-7.
Full textSimpson, Joseph J., Ann Miller, and Cihan H. Dagli. "6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric." INCOSE International Symposium 18, no. 1 (June 2008): 706–19. http://dx.doi.org/10.1002/j.2334-5837.2008.tb00838.x.
Full textGhobrial, Atef, and Theodore H. Poister. "Evaluating security of rail transit systems: A metric system approach." Journal of Advanced Transportation 29, no. 2 (March 1995): 251–62. http://dx.doi.org/10.1002/atr.5670290208.
Full textKhan, Salman A., Kashif Iqbal, Nazeeruddin Mohammad, Rehan Akbar, Syed Saad Azhar Ali, and Ammar Ahmed Siddiqui. "A Novel Fuzzy-Logic-Based Multi-Criteria Metric for Performance Evaluation of Spam Email Detection Algorithms." Applied Sciences 12, no. 14 (July 12, 2022): 7043. http://dx.doi.org/10.3390/app12147043.
Full textYeremenko, Oleksandra, Mykhailo Persikov, Valentyn Lemeshko, and Bassam Altaki. "Research and Development of the Secure Routing Flow-Based Model with Load Balancing." Problemi telekomunìkacìj, no. 2(29) (December 22, 2021): 3–14. http://dx.doi.org/10.30837/pt.2021.2.01.
Full textTkaczyk, Zoé, and William G. Moseley. "Dietary Power and Self-Determination among Female Farmers in Burkina Faso: A Proposal for a Food Consumption Agency Metric." Land 12, no. 5 (April 28, 2023): 978. http://dx.doi.org/10.3390/land12050978.
Full textYin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, and Binxing Fang. "Security Measurement for Unknown Threats Based on Attack Preferences." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/7412627.
Full textSegura Smith, Andrea, Julie Porter, Amogh Badwe, Eileen F. Kiamanesh, and Douglas W. Blayney. "Quality, clinician and information technology (IT) partnership for metric reporting." Journal of Clinical Oncology 35, no. 8_suppl (March 10, 2017): 128. http://dx.doi.org/10.1200/jco.2017.35.8_suppl.128.
Full textTashtoush, Yahya M., Aisha Zaidan, and Izzat M. Alsmadi. "Implications for Website Trust and Credibility Assessment." International Journal of E-Entrepreneurship and Innovation 3, no. 4 (October 2012): 17–33. http://dx.doi.org/10.4018/jeei.2012100102.
Full textRamanauskaitė, Simona, Neringa Urbonaitė, Šarūnas Grigaliūnas, Saulius Preidys, Vaidotas Trinkūnas, and Algimantas Venčkauskas. "Educational Organization’s Security Level Estimation Model." Applied Sciences 11, no. 17 (August 31, 2021): 8061. http://dx.doi.org/10.3390/app11178061.
Full text