To see the other types of publications on this topic, follow the link: Metric Security.

Journal articles on the topic 'Metric Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Metric Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.

Full text
Abstract:
Benchmarking security is hard and, although there are many proposals of security metrics in the literature, no consensual quantitative security metric has been previously proposed. A key difficulty is that security is usually more influenced by what is unknown about a system than by what is known. In this paper, the authors propose the use of an untrustworthiness metric for benchmarking security. This metric, based on the idea of quantifying and exposing the trustworthiness relationship between a system and its owner, represents a powerful alternative to traditional security metrics. As an exa
APA, Harvard, Vancouver, ISO, and other styles
2

Shan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.

Full text
Abstract:
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improvin
APA, Harvard, Vancouver, ISO, and other styles
3

Díaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.

Full text
Abstract:
Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually rela
APA, Harvard, Vancouver, ISO, and other styles
4

Yee, George O. M. "Designing Sound Security Metrics." International Journal of Systems and Software Security and Protection 10, no. 1 (2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.

Full text
Abstract:
This article begins with an introduction to security metrics, describing the need for security metrics, followed by a discussion of the nature of security metrics, including the challenges found with some security metrics used in the past. The article then discusses what makes a sound security metric and proposes a rigorous step-by-step method that can be applied to design sound security metrics, and to test existing security metrics to see if they are sound metrics. This is followed by a discussion of the feasibility of having scientifically-based security metrics and whether or not such metr
APA, Harvard, Vancouver, ISO, and other styles
5

Shao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.

Full text
Abstract:
As the scale and complexity of software increase, software security issues have become the focus of society. Software defect prediction (SDP) is an important means to assist developers in discovering and repairing potential defects that may endanger software security in advance and improving software security and reliability. Currently, cross-project defect prediction (CPDP) and cross-company defect prediction (CCDP) are widely studied to improve the defect prediction performance, but there are still problems such as inconsistent metrics and large differences in data distribution between sourc
APA, Harvard, Vancouver, ISO, and other styles
6

Tjirare, D., and F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia." Namibian Journal for Research, Science and Technology 1, no. 1 (2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.

Full text
Abstract:
Employees that lack security awareness may cause a threat to an organisation unintentionally. A mixed research method was used to conduct a case study to evaluate the security awareness levels of employees in one ministry to reduce the risk associated with security threats.A survey using a questionnaire was carried out with the ministry employees from four different departments. Collected data was quantitatively analysed to gauge the security risk of the organisation. Analysed survey results were used todevelop security metrics using the Goal Question Metric approach and security objectives as
APA, Harvard, Vancouver, ISO, and other styles
7

Jouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems." International Journal of Organizational and Collective Intelligence 4, no. 3 (2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.

Full text
Abstract:
Cloud computing is a growing technology used by several organizations because it presents a cost effective policy to manage and control Information Technology (IT). It delivers computing services as a public utility rather than a personal one. However, despite these benefits, it presents many challenges including access control and security problems. In order to assess security risks, the paper gives an overview of security risk management metrics. Then, it illustrates the use of a cyber security measure to describe an economic security model for cloud computing system. Moreover, it proposes a
APA, Harvard, Vancouver, ISO, and other styles
8

Le, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.

Full text
Abstract:
Securing cyber infrastructures has become critical because they are increasingly exposed to attackers while accommodating a huge number of IoT devices and supporting numerous sophisticated emerging applications. Security metrics are essential for assessing the security risks and making effective decisions concerning system security. Many security metrics rely on mathematical models, but are mainly based on empirical data, qualitative methods, or compliance checking, and this renders the outcome far from satisfactory. Computing the probability of an attack, or more precisely a threat that mater
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi, and Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products." Indian Journal of Science and Technology 8, S8 (2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ito, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (2021): 761–85. http://dx.doi.org/10.3390/iot2040038.

Full text
Abstract:
This study proposes a security-quality-metrics method tailored for the Internet of things (IoT) and evaluates conformity of the proposed approach with pertinent cybersecurity regulations and guidelines for IoT. Cybersecurity incidents involving IoT devices have recently come to light; consequently, IoT security correspondence has become a necessity. The ISO 25000 series is used for software; however, the concept of security as a quality factor has not been applied to IoT devices. Because software vulnerabilities were not the device vendors’ responsibility as product liability, most vendors did
APA, Harvard, Vancouver, ISO, and other styles
11

Ali, Shahbaz, Muhammad Khalid Mahmood, Fairouz Tchier, and F. M. O. Tawfiq. "Classification of Upper Bound Sequences of Local Fractional Metric Dimension of Rotationally Symmetric Hexagonal Planar Networks." Journal of Mathematics 2021 (February 27, 2021): 1–24. http://dx.doi.org/10.1155/2021/6613033.

Full text
Abstract:
The term metric or distance of a graph plays a vital role in the study to check the structural properties of the networks such as complexity, modularity, centrality, accessibility, connectivity, robustness, clustering, and vulnerability. In particular, various metrics or distance-based dimensions of different kinds of networks are used to resolve the problems in different strata such as in security to find a suitable place for fixing sensors for security purposes. In the field of computer science, metric dimensions are most useful in aspects such as image processing, navigation, pattern recogn
APA, Harvard, Vancouver, ISO, and other styles
12

Delli Priscoli, Francesco, Vincenzo Suraci, Roberto Germanà, Alessandro Giuseppi, Andrea Tortorelli, and Andrea Fiaschetti. "A security metric for assessing the security level of critical infrastructures." International Journal of Critical Computer-Based Systems 10, no. 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.10030622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tortorelli, Andrea, Andrea Fiaschetti, Alessandro Giuseppi, Vincenzo Suraci, Roberto Germanà, and Francesco Delli Priscoli. "A security metric for assessing the security level of critical infrastructures." International Journal of Critical Computer-Based Systems 10, no. 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.108685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Khan, Naveed, Jianbiao Zhang, and Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server." Security and Communication Networks 2022 (March 14, 2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.

Full text
Abstract:
Everyone desires to avail online services provided by different service providers securely, efficiently, and effectively. In this regard, security is still a significant concern for them. However, no one guarantees secure communication by browsing different applications remotely. To ensure confidentiality, authorization, availability, nonrepudiation, and removing eavesdropping, without a robust authentication scheme, nothing will go right. Therefore, we attempted to design a robust and privacy-preserving authentication scheme for end-users to securely access public cloud servers’ services remo
APA, Harvard, Vancouver, ISO, and other styles
15

Shi, Fan, Shaofeng Kai, Jinghua Zheng, and Yao Zhong. "XLNet-Based Prediction Model for CVSS Metric Values." Applied Sciences 12, no. 18 (2022): 8983. http://dx.doi.org/10.3390/app12188983.

Full text
Abstract:
A plethora of software vulnerabilities are exposed daily, posing a severe threat to the Internet. It is almost impossible for security experts or software developers to deal with all vulnerabilities. Therefore, it is imperative to rapidly assess the severity of the vulnerability to be able to select which one should be given preferential attention. CVSS is now the industry’s de facto evaluation standard, which is calculated with a quantitative formula to measure the severity of a vulnerability. The CVSS formula consists of several metrics related to the vulnerability’s features. Security exper
APA, Harvard, Vancouver, ISO, and other styles
16

Adamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.

Full text
Abstract:
Abstract In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation m
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Zibo, Yaofang Zhang, Zhiyao Liu, et al. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.

Full text
Abstract:
Recently, industrial control system (ICS) has gradually been a primary attack target. The main reason is that increasing vulnerabilities exposed provide opportunities for launching multistep and multihost attacks to breach security policies. To that end, vulnerability remediations are crucial for the ICS. However, there exist three problems to be tackled in a sound way. First of all, it is impractical to remove all vulnerabilities for preventing the multistep and multihost attacks in the consideration of the actual ICS demands. Secondly, ranking vulnerability remediations lacks a guidance. The
APA, Harvard, Vancouver, ISO, and other styles
18

Farid, Farnaz, Seyed Shahrestani, and Chun Ruan. "A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems." International Journal of Interactive Communication Systems and Technologies 9, no. 1 (2019): 48–76. http://dx.doi.org/10.4018/ijicst.2019010104.

Full text
Abstract:
The distributed networking system is a dominant paradigm in the industry. In today's network industry, security and Quality of service (QoS) are two key services. The distributed network deals with an entire range of parameters coming from different applications. Therefore, it is of great significance to determine a set of key parameters and draw meaningful evaluation outcomes. On the other hand, security mechanisms provide user identification, authentication, consistency and information protection over the distributed environment. This research presents some analyses which draw connections be
APA, Harvard, Vancouver, ISO, and other styles
19

Hu, Hao, Yuling Liu, Hongqi Zhang, and Yuchen Zhang. "Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis." Security and Communication Networks 2018 (August 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/5787102.

Full text
Abstract:
Network security metrics allow quantitatively evaluating the overall resilience of networked systems against attacks. From this aim, security metrics are of great importance to the security-related decision-making process of enterprises. In this paper, we employ absorbing Markov chain (AMC) to estimate the network security combining with the technique of big data correlation analysis. Specifically, we construct the model of AMC using a large amount of alert data to describe the scenario of multistep attacks in the real world. In addition, we implement big data correlation analysis to generate
APA, Harvard, Vancouver, ISO, and other styles
20

Novikova, Evgenia, Elena Doynikova, Diana Gaifulina, and Igor Kotenko. "Construction and Analysis of Integral User-Oriented Trustworthiness Metrics." Electronics 11, no. 2 (2022): 234. http://dx.doi.org/10.3390/electronics11020234.

Full text
Abstract:
Trustworthiness metrics help users to understand information system’s or a device’s security, safety, privacy, resilience, and reliability level. These metrics have different types and natures. The challenge consists of the integration of these metrics into one clear, scalable, sensitive, and reasonable metric representing overall trustworthiness level, useful for understanding if the users can trust the system or for the comparison of the devices and information systems. In this research, the authors propose a novel algorithm for calculation of an integral trustworthiness risk score that is s
APA, Harvard, Vancouver, ISO, and other styles
21

Din, Roshidi, Rosmadi Bakar, Azizan Ismail, Aida Mustapha, and Sunariya Utama. "Evaluation review of effectiveness and security metrics performance on information technology domain." Indonesian Journal of Electrical Engineering and Computer Science 16, no. 2 (2019): 1059. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1059-1064.

Full text
Abstract:
<p>Information Technology (IT) development is the vital required for human life activities in this global era. This implementation of IT system has becomes competitive among developers to increase the quality of system performance. In order to discover the IT performance of system, it neccesary to evaluate the IT implementation performance. It determines the anticipated system output to prepare to enhance the application performance. In this paper the evaluation performance that is reviewd are effectiveness and security metrics because both of evaluations able to improve the development
APA, Harvard, Vancouver, ISO, and other styles
22

Chubaievskyi, Vitaliy, Valery Lakhno, Olena Kryvoruchko, et al. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 16–28. http://dx.doi.org/10.28925/2663-4023.2021.13.1628.

Full text
Abstract:
The article describes the methodology of multi-criteria optimization of costs for the information protection system of the object of informatization. The technique is based on the use of a modified VEGA genetic algorithm. A modified algorithm for solving the MCO problem of parameters of a multi-circuit information protection system of an informatization object is proposed, which makes it possible to substantiate the rational characteristics of the ISS components, taking into account the priority metrics of OBI cybersecurity selected by the expert. In contrast to the existing classical VEGA alg
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Jing, Han-ying Hu, Min Tong, and Qing-rong Li. "A Security Metric and Related Security Routing Algorithm Design Based on Trust Model." Journal of Electronics & Information Technology 30, no. 1 (2011): 10–15. http://dx.doi.org/10.3724/sp.j.1146.2007.00726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jekl, Jan, and Jiří Jánský. "Security Challenges and Economic-Geographical Metrics for Analyzing Safety to Achieve Sustainable Protection." Sustainability 14, no. 22 (2022): 15161. http://dx.doi.org/10.3390/su142215161.

Full text
Abstract:
In this article, we aim to develop the theoretical background for the possible application of Economic-Geographical metrics in the field of population protection. We deal with various options for analyzing the availability of “safety” for citizens using studied metrics. Among others, we apply well-known metrics such as the Gini coefficient, Hoover index and even establish their generalizations. We develop a theoretical background and evaluate our findings on generated and actual data. We find that the metrics used can have an opposite interpretation depending on the scenario we are considering
APA, Harvard, Vancouver, ISO, and other styles
25

Sharma Gaur, Madhu, and Bhaskar Pant. "Trust Metric based Soft Security in Mobile Pervasive Environment." International Journal of Computer Network and Information Security 6, no. 10 (2014): 64–71. http://dx.doi.org/10.5815/ijcnis.2014.10.08.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Agrawal, A. "Software Security Metric Development Framework (An Early Stage Approach)." American Journal of Software Engineering and Applications 2, no. 6 (2013): 150. http://dx.doi.org/10.11648/j.ajsea.20130206.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mukherjee, Preetam, and Chandan Mazumdar. "“Security Concern” as a Metric for Enterprise Business Processes." IEEE Systems Journal 13, no. 4 (2019): 4015–26. http://dx.doi.org/10.1109/jsyst.2019.2918116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Zonouz, Saman A., Robin Berthier, Himanshu Khurana, William H. Sanders, and Tim Yardley. "Seclius: An Information Flow-Based, Consequence-Centric Security Metric." IEEE Transactions on Parallel and Distributed Systems 26, no. 2 (2015): 562–73. http://dx.doi.org/10.1109/tpds.2013.162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Almasizadeh, Jaafar, and Mohammad Abdollahi Azgomi. "Mean privacy: A metric for security of computer systems." Computer Communications 52 (October 2014): 47–59. http://dx.doi.org/10.1016/j.comcom.2014.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Purohit, Neha, Shubhalaxmi Joshi, Milind Pande, and Susan Lincke. "Pragmatic analysis of ECC based security models from an empirical perspective." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 739–58. http://dx.doi.org/10.47974/jdmsc-1749.

Full text
Abstract:
This paper provides a detailed discussion about currently proposed Elliptic Curve Cryptography (ECC) models focusing on performance parameters such as Security, Complexity, Scalability, and cost of deployment. It was observed that Machine Learning optimizations including bio inspired computing, deep learning, and transformation models outperform other techniques. This discussion is extended via an empirical estimation of these models related to the performance metrics under different application scenarios. This paper also proposes the calculation of an ECC Performance Metric (EPM), which combi
APA, Harvard, Vancouver, ISO, and other styles
31

Rakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks." H&ES Research 15, no. 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.

Full text
Abstract:
The security of information circulating in a computer network is related to the security of the supporting infrastructure. An important problem in the intelligent processing of syslog data is the existence of multi-label datasets. Among the Russian-language scientific publications, the problem under consideration in the context of information security of computer networks is not presented. Purpose: increase the security of computer networks by using multi-label learning methods when solving the problem of classifying system logs class labels. Results: A comparative analysis of single-valued an
APA, Harvard, Vancouver, ISO, and other styles
32

Casola, Valentina, Antonino Mazzeo, Nicola Mazzocca, and Valeria Vittorini. "A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures." Journal of Computer Security 15, no. 2 (2007): 197–229. http://dx.doi.org/10.3233/jcs-2007-15201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dobrowolski, Zbysław, and Grzegorz Drozdowski. "Does the Net Present Value as a Financial Metric Fit Investment in Green Energy Security?" Energies 15, no. 1 (2022): 353. http://dx.doi.org/10.3390/en15010353.

Full text
Abstract:
Surprisingly, little is known whether the net present value (NPV) used as a financial metric in budgeting and investment planning to analyse a projects’ profitability is universal. Meanwhile, the epochal green energy revolution ensuring carbon neutrality through green innovations requires enormous investments, and projects realised must ensure energy security. Therefore, there is a need to reanalyse financial metrics used in financial planning, including NPV. We eliminate this research gap and, based on data from Poland, Romania, Hungary, Croatia, the USA, the United Kingdom, Japan, Israel, an
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Hongsong, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee, and Zhongchuan Fu. "A novel SMP-based survivability evaluation metric and approach in wireless sensor network." Computer Science and Information Systems 16, no. 3 (2019): 733–51. http://dx.doi.org/10.2298/csis180918024c.

Full text
Abstract:
In Industrial Internet of Things (IIoT) device and network, wireless sensor network (WSN) is an important component. Routing protocol is the critical component of WSN. As the WSN may be attacked by all kinds of intruders, the survivability of WSN is important to IIoT security. To precisely evaluate the systematic survivability ability under external attack and internal security mechanism, a novel survivability entropy-based quantitative evaluation metric is proposed to calculate the systematic survivability ability of WSN routing protocol. Numerical analysis and simulation experiments are comb
APA, Harvard, Vancouver, ISO, and other styles
35

Yevseiev, Serhii, Oleksandr Milov, Ivan Opirskyy, et al. "Development of a concept for cybersecurity metrics classification." Eastern-European Journal of Enterprise Technologies 4, no. 4 (118) (2022): 6–18. http://dx.doi.org/10.15587/1729-4061.2022.263416.

Full text
Abstract:
The development of the IT industry and computing resources allows the formation of cyberphysical social systems (CPSS), which are the integration of wireless mobile and Internet technologies and the combination of the Internet of things with the technologies of cyberphysical systems. To build protection systems, while minimizing both computing and economic costs, various sets of security profiles are used, ensuring the continuity of critical business processes. To assess/compare the level of CPSS security, various assessment methods based on a set of metrics are generally used. Security metric
APA, Harvard, Vancouver, ISO, and other styles
36

Shen, Danyao, Fengchao Zhu, Zhanpeng Zhang, and Xiaodong Mu. "Radio Frequency Fingerprint Identification Based on Metric Learning." International Journal of Information Technologies and Systems Approach 16, no. 3 (2023): 1–13. http://dx.doi.org/10.4018/ijitsa.321194.

Full text
Abstract:
With the popularization of the internet of things (IoT), its security has become increasingly prominent. Radio-frequency fingerprinting (RFF) is used as a physical-layer security method to provide security in wireless networks. However, the problems of poor performance in a highly noisy environment and less consideration of calculation resources are urgent to be resolved in a practical RFF application domain. The authors propose a new RFF identification method based on metric learning. They used power spectrum density (PSD) to extract the RFF from the nonlinearity of the RF front end. Then the
APA, Harvard, Vancouver, ISO, and other styles
37

Park, Ui Hyun, Jeong-hyeop Hong, Auk Kim, and Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust." Electronics 12, no. 8 (2023): 1906. http://dx.doi.org/10.3390/electronics12081906.

Full text
Abstract:
The rapid expansion of remote work following the COVID-19 pandemic has necessitated the development of more robust and secure endpoint device security solutions. Companies have begun to adopt the zero trust security concept as an alternative to traditional network boundary security measures, which requires that every device and user be considered untrustworthy until proven otherwise. Despite the potential benefits of implementing zero trust, the stringent security measures can inadvertently lead to low availability by denying access to legitimate users or limiting their ability to access neces
APA, Harvard, Vancouver, ISO, and other styles
38

Rehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan, and Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network." Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.

Full text
Abstract:
The main benefit of selecting a suitable node as cluster head (CH) in clustering for wireless mobile sensor networks (MWSNs) is to prolong the network lifetime. But the safe selection of CH is a challenging task by taking security into account. Mostly CH selection algorithms in MWSN do not consider security when selecting CH. We have proposed secure CH selection algorithm by calculating weight of each node to deal with secure selection using minimum energy consumption. The weight of node is a combination of different metrics including trust metric (behaviors of sensor node) which promotes a se
APA, Harvard, Vancouver, ISO, and other styles
39

Lau, Terry Shue Chien, and Chik How Tan. "On the design and security of Lee metric McEliece cryptosystems." Designs, Codes and Cryptography 90, no. 3 (2022): 695–717. http://dx.doi.org/10.1007/s10623-021-01002-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

RajaSekhar, K., L. S. S. Reddy, and U. J. Kameswari. "Secure System of Attack Patterns towards Application Security Metric Derivation." International Journal of Computer Applications 53, no. 1 (2012): 11–18. http://dx.doi.org/10.5120/8384-1987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Schwartau, Winn. "Network Security It’s About Time: An Offer for a Metric." Network Security 2001, no. 8 (2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)00815-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Simpson, Joseph J., Ann Miller, and Cihan H. Dagli. "6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric." INCOSE International Symposium 18, no. 1 (2008): 706–19. http://dx.doi.org/10.1002/j.2334-5837.2008.tb00838.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ghobrial, Atef, and Theodore H. Poister. "Evaluating security of rail transit systems: A metric system approach." Journal of Advanced Transportation 29, no. 2 (1995): 251–62. http://dx.doi.org/10.1002/atr.5670290208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Khan, Salman A., Kashif Iqbal, Nazeeruddin Mohammad, Rehan Akbar, Syed Saad Azhar Ali, and Ammar Ahmed Siddiqui. "A Novel Fuzzy-Logic-Based Multi-Criteria Metric for Performance Evaluation of Spam Email Detection Algorithms." Applied Sciences 12, no. 14 (2022): 7043. http://dx.doi.org/10.3390/app12147043.

Full text
Abstract:
The increasing volume of unsolicited bulk emails has become a major threat to global security. While a significant amount of research has been carried out in terms of proposing new and better algorithms for email spam detection, relatively less attention has been given to evaluation metrics. Some widely used metrics include accuracy, recall, precision, and F-score. This paper proposes a new evaluation metric based on the concepts of fuzzy logic. The proposed metric, termed μO, combines accuracy, recall, and precision into a multi-criteria fuzzy function. Several possible evaluation rules are p
APA, Harvard, Vancouver, ISO, and other styles
45

Yeremenko, Oleksandra, Mykhailo Persikov, Valentyn Lemeshko, and Bassam Altaki. "Research and Development of the Secure Routing Flow-Based Model with Load Balancing." Problemi telekomunìkacìj, no. 2(29) (December 22, 2021): 3–14. http://dx.doi.org/10.30837/pt.2021.2.01.

Full text
Abstract:
The article is devoted to developing and researching the model of secure routing with load balancing in SD-WAN-based networks. In addition, an analysis of numerical research results using Python, GEKKO Optimization Suite, and NumPy has been carried out. The technical task of secure routing with load balancing was formulated as an optimization problem with quadratic optimality criterion. Such a criterion form allows for balancing the flow shares transmitting in the network. The simulation results showed that the link load (namely, the transmitted part of the flow) under study decreases with an
APA, Harvard, Vancouver, ISO, and other styles
46

Tkaczyk, Zoé, and William G. Moseley. "Dietary Power and Self-Determination among Female Farmers in Burkina Faso: A Proposal for a Food Consumption Agency Metric." Land 12, no. 5 (2023): 978. http://dx.doi.org/10.3390/land12050978.

Full text
Abstract:
Although food security is traditionally defined with four dimensions, there are increasing calls for an additional two: agency and sustainability. However, it is especially challenging to measure agency, a person’s control over their food production and consumption. Measuring women’s agency is especially critical in African regions south of the Sahara, where women play prominent roles in farming and food preparation. This paper explores the feasibility of creating a metric to measure agency within food systems using data related to food security and dietary diversity among female rice farmers
APA, Harvard, Vancouver, ISO, and other styles
47

Yin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li, and Binxing Fang. "Security Measurement for Unknown Threats Based on Attack Preferences." Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/7412627.

Full text
Abstract:
Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measur
APA, Harvard, Vancouver, ISO, and other styles
48

Segura Smith, Andrea, Julie Porter, Amogh Badwe, Eileen F. Kiamanesh, and Douglas W. Blayney. "Quality, clinician and information technology (IT) partnership for metric reporting." Journal of Clinical Oncology 35, no. 8_suppl (2017): 128. http://dx.doi.org/10.1200/jco.2017.35.8_suppl.128.

Full text
Abstract:
128 Background: Reporting of physician defined quality metrics, using manual data abstraction, is labor intensive and not always timely. We developed a multidisciplinary team to develop a metric reporting system. Methods: The Senior Quality Consultant (SQC) partnered with the Research Data Analyst using data extracted from the electronic data warehouse, Bone Marrow Transplant Registry, Cancer Registry, Aria (Varian, Palo Alto) and Epic (Verona, WI) and the Social Security Death index. The Plan, Do, Check Act model was used to guide the team. Results: Fourteen metrics were developed in a seven-
APA, Harvard, Vancouver, ISO, and other styles
49

Tashtoush, Yahya M., Aisha Zaidan, and Izzat M. Alsmadi. "Implications for Website Trust and Credibility Assessment." International Journal of E-Entrepreneurship and Innovation 3, no. 4 (2012): 17–33. http://dx.doi.org/10.4018/jeei.2012100102.

Full text
Abstract:
With the expansion of the Internet services provided to users to cover almost all areas that were dominated by traditional face-to-face and location based businesses, one of the major challenges for such expansion is security and its related concerns. Customers or users need to trust the websites they visit in terms of the information or content. This research proposes a new formula for evaluating the credibility (called XD TRank) metric of websites. A case study of 40 selected websites in Jordan is used to assess the proposed credibibility metric. The metrics required to assess Websites and p
APA, Harvard, Vancouver, ISO, and other styles
50

Ramanauskaitė, Simona, Neringa Urbonaitė, Šarūnas Grigaliūnas, Saulius Preidys, Vaidotas Trinkūnas, and Algimantas Venčkauskas. "Educational Organization’s Security Level Estimation Model." Applied Sciences 11, no. 17 (2021): 8061. http://dx.doi.org/10.3390/app11178061.

Full text
Abstract:
During the pandemic, distance learning gained its necessity. Most schools and universities were forced to use e-learning tools. The fast transition to distance learning increased the digitalization of the educational system and influenced the increase of security incident numbers as there was no time to estimate the security level change by incorporating new e-learning systems. Notably, preparation for distance learning was accompanied by several limitations: lack of time, lack of resources to manage the information technologies and systems, lack of knowledge on information security management
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!