Academic literature on the topic 'Probing Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Probing Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Probing Security"
Adams, Jefferson. "Probing the East German State Security Archives." International Journal of Intelligence and CounterIntelligence 13, no. 1 (January 2000): 21–34. http://dx.doi.org/10.1080/088506000304925.
Full textMolteni, Maria Chiara, and Vittorio Zaccaria. "A relation calculus for reasoning about t-probing security." Journal of Cryptographic Engineering 12, no. 1 (February 26, 2022): 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.
Full textBartz, Jennifer A., and Kristina Tchalova. "Probing the Opioidergic Basis of Attachment (In)security." Biological Psychiatry: Cognitive Neuroscience and Neuroimaging 6, no. 3 (March 2021): 256–58. http://dx.doi.org/10.1016/j.bpsc.2020.12.011.
Full textBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Full textRahman, M. Tanjidur, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor, and Navid Asadizanjani. "CONCEALING-Gate: Optical Contactless Probing Resilient Design." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–25. http://dx.doi.org/10.1145/3446998.
Full textGill, Sukhpal Singh, and Arash Shaghaghi. "Security-Aware Autonomic Allocation of Cloud Resources." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 15–22. http://dx.doi.org/10.4018/joeuc.2020070102.
Full textSenn, Martin. "The art of constructing (in)security: probing rhetorical strategies of securitisation." Journal of International Relations and Development 20, no. 3 (May 31, 2017): 605–30. http://dx.doi.org/10.1057/jird.2016.7.
Full textBijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Full textLande, Dmitrii. "Construction domain model of information security by probing Google Scholar Citations service." Collection "Information technology and security" 3, no. 1 (June 30, 2015): 4–11. http://dx.doi.org/10.20535/2411-1031.2015.3.1.57678.
Full textWangdee, Wijarn, and Roy Billinton. "Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives." IEEE Transactions on Power Systems 27, no. 4 (November 2012): 2306–13. http://dx.doi.org/10.1109/tpwrs.2012.2204281.
Full textDissertations / Theses on the topic "Probing Security"
MOLTENI, MARIA CHIARA. "ON THE SECURITY OF CRYPTOGRAPHIC CIRCUITS:PROTECTION AGAINST PROBING ATTACKS AND PERFORMANCE IMPROVEMENT OF GARBLED CIRCUITS." Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/920426.
Full textQuist, Britton T. "Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.
Full textSeagraves, Philip. "A Multi-Factor Probit Analysis of Non-Performing Commercial Mortgage-Backed Security Loans." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/real_estate_diss/13.
Full textKwon, Deukwoo. "Wavelet methods and statistical applications: network security and bioinformatics." Texas A&M University, 2005. http://hdl.handle.net/1969.1/2654.
Full textBasu, Nandita. "Pedestrian route choice behaviour: Influences of built environment on route preference, safety and security." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236797/1/Thesis_Nandita%2BBasu_24112022.pdf.
Full textChima, Chidiebere Daniel. "Socio-economic determinants of modern agricultural technology adoption in multiple food crops and its impact on productivity and food availability at the farm-level : a case study from south-eastern Nigeria." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3310.
Full textBarrigas, Jorge Filipe. "Security Probes for Industrial Control Networks." Master's thesis, 2014. http://hdl.handle.net/10316/35720.
Full textDuring the last years, some of the attacks towards SCADA made headlines, helping raise awareness. Some of the vulnerabilities may even be exploited to harm other systems, eventually, ending compromising specific points of SCADA networks. At the same time, a growing number of threats related with the physical layer made new issues and low-level mechanisms emerged, requiring careful approach and monitoring to secure such devices. Threats of this type are considered to be even more dangerous than SCADA-specific ones, since these operate at a lower level, unnoticed to scanners and anti-viruses. Considering this scenario we can expect a growing number of these threats to be affecting SCADA components, if adequate countermeasures are not taken. Over the last ten months (from September 16, 2013 until June 27, 2014), a new concept was developed, in the context of the FP7 CockpitCI project, for the current thesis, to reinforce the security of SCADA systems. This concept refers to a device installed in a key juncture of the network, with the purpose of monitoring the behavior of specific components, while reporting detected anomalies. However, even before this thesis (during the second curriculum semester of the year 2012/2013) there was already some research being made in this sense, which reflects in the amount of results included in this document.
Shao, Li-Fang, and 邵莉芳. "Probing into the demand and supply between Enterprise Customers and Information Security Corporation." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/06085571173692574786.
Full text元智大學
管理研究所
98
With the popularization of the Internet, information can be rapidly transmitted; however, what follows is the increase in security risk of information. Faced with the continuous emergence of information security events and ever-changing methods of attack, not only is the workload of information security managers increased, but also the difficulty in information security management. Therefore, enterprises and information security managers need more professional assistance and services to cope with these external information security threats. Information security corporations’ past model simply focusing on product selling can no longer meet customer needs. The operational strategy focusing on the service provision for products, development of service products, service-oriented operation, and provision of comprehensive information security service is inevitable. In order to present the value of service, information security corporations should give priority to the positioning of customer needs. Therefore, the main purposes of the study are to investigate how information security corporations should offer appropriate service to respond to current information security problems and meet customers’ expectation of “expectation meeting” and “problem solving,” and to summarize concrete strategies for them to offer services in the future. Case study method was used, and in-depth interviews were conducted to collect data. The subjects are the information security managers in three domestic large-scale enterprises and two technical advisers in information security corporations. Results indicated that the information security service that customers need is the customized service with overall planning framework, which is consistent with current environment, types and systems of information security events, as well as the instantaneous and immediate service and reporting of information security corporations. However, the most practical problem faced by enterprises is the limited budget for the installation of information security system. Suggestions on how information security corporations can try their best to meet customer needs with their limited budget are proposed as follows: information security corporations should develop newer technology, strengthen ability for problem positioning, and combine different services to provide more precise services, in the hope that the service quality can be increased and more efficient services meeting customer needs can be offered while minimization the labor costs.
Tu, Wei-Chin, and 杜偉欽. "The Research of Probing into The Security Management of Medical Institutes' Information based on HIPAA and ISO27001." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/07085188054085544295.
Full text國立成功大學
工程科學系專班
94
This research tries to assess the project as the content with 11 items in the norm of accessing of information security ISO27001, included 133 controlling measures, implement questionnaire, the norm of the information security management is proposed to accord with HIPAA bill, offering the reference of the information security to the medical treatment. With the development of computer information science and technology, the operation in daily of medical industry has used a lot of different information systems. It is the trend at the time today that the medical institute could exchange the mutual materials. The medical health organ uses the computer and network to increase the performance at job constantly. After studied the purpose, hope to involve into ISO27001 standard, but with the assessment of the HIPAA standard, administrative system concept of ISO27001 information security and practice to the information security, in which enable the medical institutes to make a good preparation in perfect to the structure of information security and application. The approach of research takes criteria of security deeply as the foundation and combined the norm of the information security in HIPAA bill with ISO27001. Applied 11 items ISO27001 to appraise project as content, it included 133 controlling measures implement of questionnaire’s method for main research approach to the materials collecting. And the subsidiary that is to establish the law of document and material, and interview, and then understanding the domestic information security of the higher level medical institutes carrying out at present situation. Using Excel to sum up and to organize the internal personnel has the practical factor that is about the problem in the incident of information. Accessing the normal demand by ISO27001 message is safely. In order to offer it in conformity with the strategy, proposing the higher level medical institutes is to improve the present situation or set up the administrative system of the information security. The hope is according with the environment of the international standard’s information security that the medical institutes' construction in the future to set out. It will take precautions against the emergence of the crisis of information security in advance. It has been found that although all medical institutes at present have already promoted the informationization, but the policy of information security has not implemented the staff of other departments. It produced the fact that Ann's accident of the money happened occasionally, so there should strengthen staff information security education, and medical institute should plan with accident. Owing to it in conformity with the draft with drilling norm to meet an emergency will be strengthen, implement information assets’ risk analysis and work of risk management in medical institutes.
FU, GONG DE, and 龔德富. "Emergency of probing into security policeman's crisis management to the masses activity of ' three cases ' that taken the place of by the people or the political party personage gets involved - take security policeman's X group as an exampleEmergency o." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/36484299301048224770.
Full text高苑科技大學
經營管理研究所
96
Because domestic recently different political parties, confront with each other with the political idea, the masses activity was frequent,the right that en suring people's gathering, parading in accordance with the constitution, should consider under national security, social common justice, civil order, public interests, security policeman how machine dredge place, with administer the state according to law, position of ' administrative neutrality ' first, divide party groupings, identity, background, Zheng Yan enforce the law, remove flat conflict on invisible, it is undoubtedly that security policeman deals with the key that the masses move about. Research this probe into security policeman X group deal with masses activity, set out to conflict situation ' 3 cases ',etc.topic mainly, is it resist between conflict and security policeman influence and security policeman of emergency, crisis of management in the face of the conflict of resisting to get involved with popular representative or political party personage, about conflict sit uation, for core communicate coordinate, crisis management in advance, in the thing and prepare and question of handling etc.afterwards, visit hardworking Kaohsjung of the association (institute has jurisdiction over) Security pol iceman X of city old team member alert to deal with masses activity in the face of conflict situation,etc. at the topic, security policeman about conflict it handle,it plan, not handle among thing in advance,thing aftertreatment,etc. crisis management meet an emergency as discussion, sum up and is it discuss and make conclusion and suggestion to analyse, is it make in the future dealing with similar masses activity resist crisis, conflict of incident manage reference that meet an emergency to support. This research is with Kendall's harmonious coefficient (the.Kendall coefficient of oncordance) . Analyse three case (case point mercury mud transport back to platform mould Kaohsjung benevolence military factory people enclose the in cident of resisting of factory; The case is the third great explosion in half a year of factory of Kaohsjung of oil in the forefinger; Stamina people enclose theincident of resisting of factory; Case three refer to 918 person create disturbances to emergency, conflict of course handle) ,Whether the rank to five questions is apparent, propose the investigation result, prove, and then leave the age, age and service seniority and the views of three literary composition surfaces to the crisis of rank of duty, prove security policeman's X group manages the adaptability to changes to the crisis of the masses activity, and assay and analyse, probes into the parameters of people with F: Age (5 grades) , the age and service seniority (5 grades) And duty grade (5 grades) ,Each deal with and thing aftertreatment planning in advance, thing, are three literary composition surface views the same? Learnt by the result of study, 1 case, 2 case, 3 case is it show to five topic relevant to have in ' three case ', at the age of the parameters of people (5 grades) , the age and service seniority (five grades) And duty grade (5 grades) Whether to constructing the Taxi view, there are differences.
Books on the topic "Probing Security"
Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont: Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.
Find full textCavelty, Myriam Dunn, Ursula Jasper, and Andreas Wenger. Politics and Science of Prevision: Governing and Probing the Future. Taylor & Francis Group, 2020.
Find full textCavelty, Myriam Dunn, Ursula Jasper, and Andreas Wenger. Politics and Science of Prevision: Governing and Probing the Future. Taylor & Francis Group, 2020.
Find full textBashevkin, Sylvia. Women as Foreign Policy Leaders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.001.0001.
Full textBook chapters on the topic "Probing Security"
Cassiers, Gaëtan. "Probing Model." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1699-1.
Full textSchmidt, Jörn-Marc, and Chong Hee Kim. "A Probing Attack on AES." In Information Security Applications, 256–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_19.
Full textCarlet, Claude, Emmanuel Prouff, Matthieu Rivain, and Thomas Roche. "Algebraic Decomposition for Probing Security." In Lecture Notes in Computer Science, 742–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47989-6_36.
Full textCassiers, Gaëtan, Sebastian Faust, Maximilian Orlt, and François-Xavier Standaert. "Towards Tight Random Probing Security." In Advances in Cryptology – CRYPTO 2021, 185–214. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_7.
Full textTajik, Shahin. "Optical Contactless Probing." In On the Physical Security of Physically Unclonable Functions, 55–69. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75820-6_6.
Full textShi, Qihang, Domenic Forte, and Mark M. Tehranipoor. "Analyzing Circuit Layout to Probing Attack." In Hardware IP Security and Trust, 73–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0_5.
Full textLiu, Feng-Hao, and Anna Lysyanskaya. "Algorithmic Tamper-Proof Security under Probing Attacks." In Lecture Notes in Computer Science, 106–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_8.
Full textLuo, Yang, Qingni Shen, Cong Li, Kang Chen, and Zhonghai Wu. "Probing the Scheduling Algorithms in the Cloud Based on OpenStack." In Cloud Computing and Security, 510–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7_44.
Full textTakarabt, Sofiane, Sylvain Guilley, Youssef Souissi, Laurent Sauvage, and Yves Mathieu. "Post-layout Security Evaluation Methodology Against Probing Attacks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 465–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77424-0_37.
Full textBou-Harb, Elias, and Claude Fachkha. "On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns." In Computer and Network Security Essentials, 461–74. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_26.
Full textConference papers on the topic "Probing Security"
Göktas, Enes, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, and Cristiano Giuffrida. "Speculative Probing." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3417289.
Full textKoehler, Chase, Divita Mathur, Eric Henderson, and Robyn Lutz. "Probing the Security of DNA Origami." In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2018. http://dx.doi.org/10.1109/issrew.2018.00-14.
Full textYoder, Theodore J., and Michael R. Frey. "Probing correlation in quantum arrays." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919135.
Full textMartin, James S., Waymond R. Scott, Jr., Gregg D. Larson, Peter H. Rogers, and George S. McCall II. "Probing signal design for seismic landmine detection." In Defense and Security, edited by Russell S. Harmon, J. Thomas Broach, and John H. Holloway, Jr. SPIE, 2004. http://dx.doi.org/10.1117/12.542554.
Full textFlores, Lilia Gomez, Sandra Wilson, and Dougie Kinnear. "Probing identity management." In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517881.2517888.
Full textMolteni, Maria Chiara, Vittorio Zaccaria, and Valentina Ciriani. "ADD-based Spectral Analysis of Probing Security." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774700.
Full textLi, YongGang, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, and Guoyuan Lin. "MProbe: Make the code probing meaningless." In ACSAC: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3564625.3567967.
Full textBesson, Frédéric, Alexandre Dang, and Thomas Jensen. "Securing Compilation Against Memory Probing." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3264820.3264822.
Full textArnone, Robert, Sergio Derada, Sherwin Ladner, and Charles Trees. "Probing the subsurface ocean processes using ocean LIDARS." In SPIE Defense, Security, and Sensing, edited by Weilin W. Hou and Robert Arnone. SPIE, 2012. http://dx.doi.org/10.1117/12.921103.
Full textJiang, Yi, and Christopher D. Gianelli. "Notched spectrum: from probing waveforms to receive filters." In SPIE Defense, Security, and Sensing, edited by Edmund Zelnio and Frederick D. Garber. SPIE, 2013. http://dx.doi.org/10.1117/12.2016079.
Full text