Academic literature on the topic 'Probing Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Probing Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Probing Security"

1

Adams, Jefferson. "Probing the East German State Security Archives." International Journal of Intelligence and CounterIntelligence 13, no. 1 (January 2000): 21–34. http://dx.doi.org/10.1080/088506000304925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Molteni, Maria Chiara, and Vittorio Zaccaria. "A relation calculus for reasoning about t-probing security." Journal of Cryptographic Engineering 12, no. 1 (February 26, 2022): 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.

Full text
Abstract:
AbstractIn the context of side-channel attacks against cryptographic circuits, t-probing security characterizes the amount of information derivable about sensitive values (e.g., keys) by observing t output/internal values. Non-interference is a useful mathematical tool used by researchers to assess the probing security of a circuit which employs Boolean masking to protect itself from attacks. However, reasoning about non-interference still requires either difficult ratiocination or complex automatic tools. In this work, we propose a novel point of view to reason about non-interference, by exploiting the Walsh transform of a Boolean function. To this end, we introduce a calculus for mechanically reasoning about the shares of a variable and show that this formalism provides a lean algebraic explanation of known compositional patterns allowing for the discovery of new ones. Eventually, we show how this formalism can be applied to study the probing security of known cryptographic gadgets.
APA, Harvard, Vancouver, ISO, and other styles
3

Bartz, Jennifer A., and Kristina Tchalova. "Probing the Opioidergic Basis of Attachment (In)security." Biological Psychiatry: Cognitive Neuroscience and Neuroimaging 6, no. 3 (March 2021): 256–58. http://dx.doi.org/10.1016/j.bpsc.2020.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas, and Navid Asadizanjani. "Security Assessment of Nonvolatile Memory Against Physical Probing." EDFA Technical Articles 24, no. 4 (November 1, 2022): 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.

Full text
Abstract:
Abstract This article describes how physical attacks can be launched on different types of nonvolatile memory (NVM) cells using failure analysis tools. It explains how the bit information stored inside these devices is susceptible to read-out and fault injection attacks and defines vulnerability parameters to help quantify risks associated with different modalities of attack. It also presents an in-depth security analysis of emerging NVM technologies and discusses potential countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, M. Tanjidur, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor, and Navid Asadizanjani. "CONCEALING-Gate: Optical Contactless Probing Resilient Design." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (June 25, 2021): 1–25. http://dx.doi.org/10.1145/3446998.

Full text
Abstract:
Optical probing, though developed as silicon debugging tools from the chip backside, has shown its capability of extracting secret data, such as cryptographic keys and user identifications, from modern system-on-chip devices. Existing optical probing countermeasures are based on detecting any device modification attempt or abrupt change in operating conditions during asset extraction. These countermeasures usually require additional fabrication steps and cause area and power overheads. In this article, we propose a novel low-overhead design methodology to prevent optical probing. It leverages additional operational logic gates, termed as “CONCEALING-Gates,” inserted as neighbor gates of the logic gates connected to the nets carrying asset signals. The switching activity of the asset carrying logic is camouflaged with the switching activity of the concealing-gate. The input signal and placement in the layout of the concealing-gates must be selected in such a way that they remain equally effective in preventing different variants of optical probing, i.e., electro-optical frequency mapping and Electro-optical probing. The methodology is suitable for the existing ASIC/FPGA design flow and fabrication process, since designing new standard logic cells is not required. We have performed a comprehensive security evaluation of the concealing-gates using a security metric developed based on the parameters that are crucial for optical probing. The attack resiliency of the logic cells, protected by concealing-gates, is evaluated using an empirical study-based simulation methodology and experimental validation. Our analysis has shown that in the presence of concealing-gates, logic cells achieve high resiliency against optical contactless probing techniques.
APA, Harvard, Vancouver, ISO, and other styles
6

Gill, Sukhpal Singh, and Arash Shaghaghi. "Security-Aware Autonomic Allocation of Cloud Resources." Journal of Organizational and End User Computing 32, no. 3 (July 2020): 15–22. http://dx.doi.org/10.4018/joeuc.2020070102.

Full text
Abstract:
Cloud computing has emerged as a dominant platform for computing for the foreseeable future. A key factor in the adoption of this technology is its security and reliability. Here, this article addresses a key challenge which is the secure allocation of resources. The authors propose a security-based resource allocation model for execution of cloud workloads called STARK. The solution is designed to ensure security against probing, User to Root (U2R), Remote to Local (R2L) and Denial of Service (DoS) attacks whilst the execution of heterogeneous cloud workloads. Further, this paper highlights the promising directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
7

Senn, Martin. "The art of constructing (in)security: probing rhetorical strategies of securitisation." Journal of International Relations and Development 20, no. 3 (May 31, 2017): 605–30. http://dx.doi.org/10.1057/jird.2016.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bijalwan, Anchit, Vijender Kumar Solanki, and Emmanuel Shubhakar Pilli. "BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES." Network Protocols and Algorithms 10, no. 2 (June 28, 2018): 28. http://dx.doi.org/10.5296/npa.v10i2.13144.

Full text
Abstract:
Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty. Such activities are direct attacks on the safety, security and confidentiality of the organization. These activities put organizational privacy at stake. Botnet forensic is utilized to strengthen the security issues by understanding the modus operandi of the attacks. The available observations can be utilized in future also to prevent a potential threat to network security. This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.
APA, Harvard, Vancouver, ISO, and other styles
9

Lande, Dmitrii. "Construction domain model of information security by probing Google Scholar Citations service." Collection "Information technology and security" 3, no. 1 (June 30, 2015): 4–11. http://dx.doi.org/10.20535/2411-1031.2015.3.1.57678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wangdee, Wijarn, and Roy Billinton. "Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives." IEEE Transactions on Power Systems 27, no. 4 (November 2012): 2306–13. http://dx.doi.org/10.1109/tpwrs.2012.2204281.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Probing Security"

1

MOLTENI, MARIA CHIARA. "ON THE SECURITY OF CRYPTOGRAPHIC CIRCUITS:PROTECTION AGAINST PROBING ATTACKS AND PERFORMANCE IMPROVEMENT OF GARBLED CIRCUITS." Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/920426.

Full text
Abstract:
Dealing with secure computation and communication in hardware devices, an attacker that threatens to security of the systems can be of two different types. The first type of attacker is external to the exchange of secret messages and tries to steal some sensitive information. Probing a circuit is a useful technique through which an attacker can derive information correlated with the secret manipulated by a cryptographic circuit. Probing security is the branch of research that tries to devise models, tools and countermeasures against this type of attacks. We define a new methodology that allows to determine if a gadget (i.e., a portion of a circuit) is secure against probing attacks. Moreover, we reason about composability of gadgets, in such a way that also this composition is probing secure. The reasoning is extended also to the case in which glitches are considered, namely when the attacks are mounted when timing hazards are present. The proposed methodology is based on the construction of the Walsh matrix of a Boolean function that describes the operations of the circuit. This method allows reaching an exact solution, but generally needs a lot of computation’s time (mainly for big gadgets). To overcome the problem, we propose to compute the Walsh matrix exploiting the theory and applications of Algebraic Decision Diagrams (ADDs). Different is the case when the malicious part is internal: each party is interested in protecting its own sensitive information from all the others. When the parties are only two, from literature the garbled circuit protocol is a solution that allows to reach a result implying some secrets, without sharing them. The cost of this protocol depends on the number of extit{and} gates in the circuit that implements the Boolean function describing the protocol computations. In this context, we work to reduce the number of multiplications in two classes of particular Boolean functions, called autosymmetric and D-reducible. Moreover, in the context of the garbled circuit protocol, we discuss some innovative solutions to further reduce the protocol's costs, as the application of the 3-valued logic. This logic is an extension of the Boolean one, resulting from the addition of a new element to the set Boolean set ${0,1}$.
APA, Harvard, Vancouver, ISO, and other styles
2

Quist, Britton T. "Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems." BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.

Full text
Abstract:
Establishing secret keys from the commonly-observed randomness of reciprocal wireless propagation channels has recently received considerable attention. In this work we propose improved strategies for channel estimation between MIMO or beamforming systems for secret key generation. The amount of mutual information that can be extracted from the channel matrix estimates is determined by the quality of channel matrix estimates. By allocating increased energy to channel estimation for higher gain beamforming combinations at the expense of low-gain combinations, key establishment performance can be increased. Formalizing the notion of preferential energy allocation to the most efficient excitations is the central theme of this dissertation. For probing with beamforming systems, we formulate a theoretically optimal probing strategy that upper bounds the number of key bits that can be generated from reciprocal channel observations. Specifically, we demonstrate that the eigenvectors of the channel spatial covariance matrix should be used as beamformer weights during channel estimation and we optimize the energy allocated to channel estimation for each beamformer weight under a total energy constraint. The optimal probing strategy is not directly implementable in practice, and therefore we propose two different modifications to the optimal algorithm based on a Kronecker approximation to the spatial covariance matrix. Though these approximations are suboptimal, they each perform well relative to the upper bound. To explore how effective an array is at extracting all of the information available in the propagation environment connecting two nodes, we apply the optimal beamformer probing strategy to a vector current basis function expansion on the array volume. We prove that the resulting key rate is a key rate spatial bound that upper bounds the key rate achievable by any set of antenna arrays probing the channel with the same total energy constraint. For MIMO systems we assume the channel is separable with a Kronecker model, and then for that model we propose an improved probing strategy that iteratively optimizes the energy allocation for each node using concave maximization. The performance of this iterative approach is better than that achieved using the traditional probing strategy in many realistic probing scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Seagraves, Philip. "A Multi-Factor Probit Analysis of Non-Performing Commercial Mortgage-Backed Security Loans." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/real_estate_diss/13.

Full text
Abstract:
Commercial mortgage underwriters have traditionally relied upon a standard set of criteria for approving and pricing loans. The increased level of commercial mortgage loan defaults from 1% at the start of 2009 to 9.32% by the end of 2011 provides motivation for questioning underwriting standards which previously served the lending industry well. This dissertation investigates factors that affect the probability of Non-performance among commercial mortgage-backed security (CMBS) loans, proposes conditions under which the standard ratios may not apply, and tests additional criteria which may prove useful during economic periods previously not experienced by commercial mortgage underwriters. In this dissertation, Cap Rate Spread, the difference between the cap rate of a property and the Coupon Rate of the associated loan, is introduced to test whether the probability of Non-performance can be better predicted than by relying on traditional commercial mortgage underwriting criteria such as Loan to Value (LTV) and Debt Service Coverage Ratio (DSCR). Testing the research hypotheses with a probit model using a database of 47,883 U.S. CMBS loans from 1993 to 2011, Cap Rate Spread is found to have a significantly negative relationship with loan Non-performance. That is, as the Cap Rate Spread falls, the probability of Non-performance rises appreciably. A numerical model suggests that among loans which would have passed the standard ratio tests requiring loans to have values of LTV less than .8 and DSCR greater than 1.25, a Cap Rate Spread criteria requiring loans to have a value greater than 1% would have prevented the origination of an additional 1,798 CMBS loans reducing the rate of Non-performance from 14.9% with only the LTV and DSCR criteria to just 11.6% by adding the Cap Rate Spread criteria. Of course, adding additional criteria will also lead to errors of rejecting loans which would have performed well. Back testing with the same sample of CMBS loans, this Type I error rate rises from 19% with only the LTV and DSCR criteria to 34% with the addition of the Cap Rate Spread. Ultimately, CMBS loan underwriters must individually determine an acceptable level of Non-performance appropriate to their business model and tolerance for risk. Using intuition, experience, tools, and rules, each underwriter must choose a balance between the competing risks of rejecting potentially profitable loans and accepting loans which will fail. This research result is important because it helps deepen our understanding of the relationships between property income and loan performance and provides an additional tool that underwriters may employ in assessing CMBS loan risk.
APA, Harvard, Vancouver, ISO, and other styles
4

Kwon, Deukwoo. "Wavelet methods and statistical applications: network security and bioinformatics." Texas A&M University, 2005. http://hdl.handle.net/1969.1/2654.

Full text
Abstract:
Wavelet methods possess versatile properties for statistical applications. We would like to explore the advantages of using wavelets in the analyses in two different research areas. First of all, we develop an integrated tool for online detection of network anomalies. We consider statistical change point detection algorithms, for both local changes in the variance and for jumps detection, and propose modified versions of these algorithms based on moving window techniques. We investigate performances on simulated data and on network traffic data with several superimposed attacks. All detection methods are based on wavelet packets transformations. We also propose a Bayesian model for the analysis of high-throughput data where the outcome of interest has a natural ordering. The method provides a unified approach for identifying relevant markers and predicting class memberships. This is accomplished by building a stochastic search variable selection method into an ordinal model. We apply the methodology to the analysis of proteomic studies in prostate cancer. We explore wavelet-based techniques to remove noise from the protein mass spectra. The goal is to identify protein markers associated with prostate-specific antigen (PSA) level, an ordinal diagnostic measure currently used to stratify patients into different risk groups.
APA, Harvard, Vancouver, ISO, and other styles
5

Basu, Nandita. "Pedestrian route choice behaviour: Influences of built environment on route preference, safety and security." Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236797/1/Thesis_Nandita%2BBasu_24112022.pdf.

Full text
Abstract:
Built environment factors influence pedestrian route choice behaviour, but their impact is not well known. This thesis investigates the influences of the built environment factors on walking route preference and safety. By using the ‘Physical Activity through Sustainable Transport Approaches’ framework, this research studied the perceptions and preferences of pedestrian route choice in a typical suburban environment in Australia through a stated preference survey. This thesis has established the interrelationship between safety, security, and built environment factors across men and women pedestrians. The findings highlight increasing land-use diversity and providing adequate trees may improve perceived safety and security among pedestrians.
APA, Harvard, Vancouver, ISO, and other styles
6

Chima, Chidiebere Daniel. "Socio-economic determinants of modern agricultural technology adoption in multiple food crops and its impact on productivity and food availability at the farm-level : a case study from south-eastern Nigeria." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3310.

Full text
Abstract:
Farmers generally produce multiple crops while selectively adopting modern technologies to meet various needs. The main aim of this study is, therefore, to identify the range of socio-economic factors influencing the adoption of modern agricultural technology in multiple food crops and the corresponding impacts on productivity and food availability at the farm-level in South-eastern Nigeria. In this study, three major food crops (i.e., rice, yam and cassava) and two elements of modern technologies (i.e., HYV seeds and inorganic fertilizers) are considered. The hypotheses of the study are that inverse farm size – technology adoption, size – productivity, size- profitability and size – food availability relationships exist in Nigerian agriculture. The research is based on an in-depth farm-survey of 400 farmers from two states (251 from Ebonyi and 149 from Anambra states) of South-eastern Nigeria. Data has also been derived from surveys and interviews of ADP Program Managers and NGOs. A range of qualitative and quantitative methods including inferential statistics, bivariate probit model and regression analysis were used in order to achieve the specific objectives and test hypotheses. The results show that sample respondents are dominated by small scale farmers (81% of total) owning land less than 1 ha. The average farm size is small estimated at 1.27 ha. Farmers grow multiple crops instead of a single crop, i.e., 68% of the surveyed farmers grew at least two food crops. The level of modern technology adoption is low and mixed and farmers selectively adopt components of technologies as expected and use far less than recommended dose of fertilizers in crops. Only 29% of farmers adopted both HYV seeds and fertilizers as a package. The study clearly demonstrates that inverse farm size – technology adoption, farm size – productivity, and farm size – food availability relationships exist in agriculture in this region of Nigeria; but not inverse farm size – profitability. The bivariate probit model diagnostic reveals that the decision to adopt modern technologies are significantly correlated, implying that univariate analysis of such decisions are biased, thereby, justifying use of the bivariate approach. Overall, the most dominant determinants are the positive influence of farming experience and the negative influence of remoteness of extension services on modern technology adoption. The per capita per day level of mean food produced is 12322.74 calories from one ha of land and food available for consumption is 4693.34 calories which is higher than the daily requirement of 2000 calories. Yam is produced mainly for sale while cassava is produced for consumption. Regression analysis shows that farm size and share of cassava in the total crop portfolio significantly increases food availability. A host of constraints are affecting Nigerian agriculture, which includes lack of extension agents, credit facilities, farm inputs, irrigation, and value addition and corruption, lack of support for ADP staff and ineffective government policies. Policy implications include investment in extension credit services and other infrastructure (e.g., irrigation, ADP staff), training of small farmers in business skills, promotion of modern technology, as a package as well as special projects targeted for cassava (e.g., Cassava Plus project) in order to boost modern technology adoption in food crops, as well as improving productivity, profitability and food availability at the farm-level in Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
7

Barrigas, Jorge Filipe. "Security Probes for Industrial Control Networks." Master's thesis, 2014. http://hdl.handle.net/10316/35720.

Full text
Abstract:
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia da Universidade de Coimbra
During the last years, some of the attacks towards SCADA made headlines, helping raise awareness. Some of the vulnerabilities may even be exploited to harm other systems, eventually, ending compromising specific points of SCADA networks. At the same time, a growing number of threats related with the physical layer made new issues and low-level mechanisms emerged, requiring careful approach and monitoring to secure such devices. Threats of this type are considered to be even more dangerous than SCADA-specific ones, since these operate at a lower level, unnoticed to scanners and anti-viruses. Considering this scenario we can expect a growing number of these threats to be affecting SCADA components, if adequate countermeasures are not taken. Over the last ten months (from September 16, 2013 until June 27, 2014), a new concept was developed, in the context of the FP7 CockpitCI project, for the current thesis, to reinforce the security of SCADA systems. This concept refers to a device installed in a key juncture of the network, with the purpose of monitoring the behavior of specific components, while reporting detected anomalies. However, even before this thesis (during the second curriculum semester of the year 2012/2013) there was already some research being made in this sense, which reflects in the amount of results included in this document.
APA, Harvard, Vancouver, ISO, and other styles
8

Shao, Li-Fang, and 邵莉芳. "Probing into the demand and supply between Enterprise Customers and Information Security Corporation." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/06085571173692574786.

Full text
Abstract:
碩士
元智大學
管理研究所
98
With the popularization of the Internet, information can be rapidly transmitted; however, what follows is the increase in security risk of information. Faced with the continuous emergence of information security events and ever-changing methods of attack, not only is the workload of information security managers increased, but also the difficulty in information security management. Therefore, enterprises and information security managers need more professional assistance and services to cope with these external information security threats. Information security corporations’ past model simply focusing on product selling can no longer meet customer needs. The operational strategy focusing on the service provision for products, development of service products, service-oriented operation, and provision of comprehensive information security service is inevitable. In order to present the value of service, information security corporations should give priority to the positioning of customer needs. Therefore, the main purposes of the study are to investigate how information security corporations should offer appropriate service to respond to current information security problems and meet customers’ expectation of “expectation meeting” and “problem solving,” and to summarize concrete strategies for them to offer services in the future. Case study method was used, and in-depth interviews were conducted to collect data. The subjects are the information security managers in three domestic large-scale enterprises and two technical advisers in information security corporations. Results indicated that the information security service that customers need is the customized service with overall planning framework, which is consistent with current environment, types and systems of information security events, as well as the instantaneous and immediate service and reporting of information security corporations. However, the most practical problem faced by enterprises is the limited budget for the installation of information security system. Suggestions on how information security corporations can try their best to meet customer needs with their limited budget are proposed as follows: information security corporations should develop newer technology, strengthen ability for problem positioning, and combine different services to provide more precise services, in the hope that the service quality can be increased and more efficient services meeting customer needs can be offered while minimization the labor costs.
APA, Harvard, Vancouver, ISO, and other styles
9

Tu, Wei-Chin, and 杜偉欽. "The Research of Probing into The Security Management of Medical Institutes' Information based on HIPAA and ISO27001." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/07085188054085544295.

Full text
Abstract:
碩士
國立成功大學
工程科學系專班
94
This research tries to assess the project as the content with 11 items in the norm of accessing of information security ISO27001, included 133 controlling measures, implement questionnaire, the norm of the information security management is proposed to accord with HIPAA bill, offering the reference of the information security to the medical treatment. With the development of computer information science and technology, the operation in daily of medical industry has used a lot of different information systems. It is the trend at the time today that the medical institute could exchange the mutual materials. The medical health organ uses the computer and network to increase the performance at job constantly. After studied the purpose, hope to involve into ISO27001 standard, but with the assessment of the HIPAA standard, administrative system concept of ISO27001 information security and practice to the information security, in which enable the medical institutes to make a good preparation in perfect to the structure of information security and application. The approach of research takes criteria of security deeply as the foundation and combined the norm of the information security in HIPAA bill with ISO27001. Applied 11 items ISO27001 to appraise project as content, it included 133 controlling measures implement of questionnaire’s method for main research approach to the materials collecting. And the subsidiary that is to establish the law of document and material, and interview, and then understanding the domestic information security of the higher level medical institutes carrying out at present situation. Using Excel to sum up and to organize the internal personnel has the practical factor that is about the problem in the incident of information. Accessing the normal demand by ISO27001 message is safely. In order to offer it in conformity with the strategy, proposing the higher level medical institutes is to improve the present situation or set up the administrative system of the information security. The hope is according with the environment of the international standard’s information security that the medical institutes' construction in the future to set out. It will take precautions against the emergence of the crisis of information security in advance. It has been found that although all medical institutes at present have already promoted the informationization, but the policy of information security has not implemented the staff of other departments. It produced the fact that Ann's accident of the money happened occasionally, so there should strengthen staff information security education, and medical institute should plan with accident. Owing to it in conformity with the draft with drilling norm to meet an emergency will be strengthen, implement information assets’ risk analysis and work of risk management in medical institutes.
APA, Harvard, Vancouver, ISO, and other styles
10

FU, GONG DE, and 龔德富. "Emergency of probing into security policeman's crisis management to the masses activity of ' three cases ' that taken the place of by the people or the political party personage gets involved - take security policeman's X group as an exampleEmergency o." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/36484299301048224770.

Full text
Abstract:
碩士
高苑科技大學
經營管理研究所
96
Because domestic recently different political parties, confront with each other with the political idea, the masses activity was frequent,the right that en suring people's gathering, parading in accordance with the constitution, should consider under national security, social common justice, civil order, public interests, security policeman how machine dredge place, with administer the state according to law, position of ' administrative neutrality ' first, divide party groupings, identity, background, Zheng Yan enforce the law, remove flat conflict on invisible, it is undoubtedly that security policeman deals with the key that the masses move about. Research this probe into security policeman X group deal with masses activity, set out to conflict situation ' 3 cases ',etc.topic mainly, is it resist between conflict and security policeman influence and security policeman of emergency, crisis of management in the face of the conflict of resisting to get involved with popular representative or political party personage, about conflict sit uation, for core communicate coordinate, crisis management in advance, in the thing and prepare and question of handling etc.afterwards, visit hardworking Kaohsjung of the association (institute has jurisdiction over) Security pol iceman X of city old team member alert to deal with masses activity in the face of conflict situation,etc. at the topic, security policeman about conflict it handle,it plan, not handle among thing in advance,thing aftertreatment,etc. crisis management meet an emergency as discussion, sum up and is it discuss and make conclusion and suggestion to analyse, is it make in the future dealing with similar masses activity resist crisis, conflict of incident manage reference that meet an emergency to support. This research is with Kendall's harmonious coefficient (the.Kendall coefficient of oncordance) . Analyse three case (case point mercury mud transport back to platform mould Kaohsjung benevolence military factory people enclose the in cident of resisting of factory; The case is the third great explosion in half a year of factory of Kaohsjung of oil in the forefinger; Stamina people enclose theincident of resisting of factory; Case three refer to 918 person create disturbances to emergency, conflict of course handle) ,Whether the rank to five questions is apparent, propose the investigation result, prove, and then leave the age, age and service seniority and the views of three literary composition surfaces to the crisis of rank of duty, prove security policeman's X group manages the adaptability to changes to the crisis of the masses activity, and assay and analyse, probes into the parameters of people with F: Age (5 grades) , the age and service seniority (5 grades) And duty grade (5 grades) ,Each deal with and thing aftertreatment planning in advance, thing, are three literary composition surface views the same? Learnt by the result of study, 1 case, 2 case, 3 case is it show to five topic relevant to have in ' three case ', at the age of the parameters of people (5 grades) , the age and service seniority (five grades) And duty grade (5 grades) Whether to constructing the Taxi view, there are differences.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Probing Security"

1

Wesley, Michael. Between probity and proficiency: Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont: Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cavelty, Myriam Dunn, Ursula Jasper, and Andreas Wenger. Politics and Science of Prevision: Governing and Probing the Future. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cavelty, Myriam Dunn, Ursula Jasper, and Andreas Wenger. Politics and Science of Prevision: Governing and Probing the Future. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bashevkin, Sylvia. Women as Foreign Policy Leaders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.001.0001.

Full text
Abstract:
What is known about women’s participation as decision-makers in international affairs? Is it fair to assume, as many observers do, that female elites will mirror the relatively pacifist preferences of women in the general public as well as the claims of progressive feminist movements? By focusing on women’s presence in senior national security positions in the American political executive, Women as Foreign Policy Leaders offers among the first systematic responses to these questions. It examines four high-profile appointees in the United States since 1980: Jeane Kirkpatrick during the Reagan years, Madeleine Albright in the Clinton era, Condoleezza Rice during the George W. Bush presidencies, and Hillary Rodham Clinton in the first Obama mandate. Women as Foreign Policy Leaders documents the difference these four women made in a domain long dominated by men. In probing the actions taken by four appointees on matters of political conflict and gender equality, the book demonstrates that female decision-makers made diverse and transformative contributions during a series of Republican and Democratic presidential administrations. The track records of these four women reveal not just a consistent willingness to pursue muscular, aggressive approaches to international relations, but also widely divergent views about feminism. Women as Foreign Policy Leaders shows how Kirkpatrick, Albright, Rice, and Clinton staked out their presence on the international scene and provided a crucial antidote to the silencing of women’s voices in global politics.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Probing Security"

1

Cassiers, Gaëtan. "Probing Model." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1699-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schmidt, Jörn-Marc, and Chong Hee Kim. "A Probing Attack on AES." In Information Security Applications, 256–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carlet, Claude, Emmanuel Prouff, Matthieu Rivain, and Thomas Roche. "Algebraic Decomposition for Probing Security." In Lecture Notes in Computer Science, 742–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47989-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cassiers, Gaëtan, Sebastian Faust, Maximilian Orlt, and François-Xavier Standaert. "Towards Tight Random Probing Security." In Advances in Cryptology – CRYPTO 2021, 185–214. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tajik, Shahin. "Optical Contactless Probing." In On the Physical Security of Physically Unclonable Functions, 55–69. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75820-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shi, Qihang, Domenic Forte, and Mark M. Tehranipoor. "Analyzing Circuit Layout to Probing Attack." In Hardware IP Security and Trust, 73–98. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Feng-Hao, and Anna Lysyanskaya. "Algorithmic Tamper-Proof Security under Probing Attacks." In Lecture Notes in Computer Science, 106–20. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Luo, Yang, Qingni Shen, Cong Li, Kang Chen, and Zhonghai Wu. "Probing the Scheduling Algorithms in the Cloud Based on OpenStack." In Cloud Computing and Security, 510–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Takarabt, Sofiane, Sylvain Guilley, Youssef Souissi, Laurent Sauvage, and Yves Mathieu. "Post-layout Security Evaluation Methodology Against Probing Attacks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 465–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77424-0_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bou-Harb, Elias, and Claude Fachkha. "On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns." In Computer and Network Security Essentials, 461–74. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Probing Security"

1

Göktas, Enes, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, and Cristiano Giuffrida. "Speculative Probing." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3372297.3417289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Koehler, Chase, Divita Mathur, Eric Henderson, and Robyn Lutz. "Probing the Security of DNA Origami." In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2018. http://dx.doi.org/10.1109/issrew.2018.00-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yoder, Theodore J., and Michael R. Frey. "Probing correlation in quantum arrays." In SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Martin, James S., Waymond R. Scott, Jr., Gregg D. Larson, Peter H. Rogers, and George S. McCall II. "Probing signal design for seismic landmine detection." In Defense and Security, edited by Russell S. Harmon, J. Thomas Broach, and John H. Holloway, Jr. SPIE, 2004. http://dx.doi.org/10.1117/12.542554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Flores, Lilia Gomez, Sandra Wilson, and Dougie Kinnear. "Probing identity management." In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517881.2517888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Molteni, Maria Chiara, Vittorio Zaccaria, and Valentina Ciriani. "ADD-based Spectral Analysis of Probing Security." In 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, YongGang, Yeh-Ching Chung, Jinbiao Xing, Yu Bao, and Guoyuan Lin. "MProbe: Make the code probing meaningless." In ACSAC: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3564625.3567967.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Besson, Frédéric, Alexandre Dang, and Thomas Jensen. "Securing Compilation Against Memory Probing." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3264820.3264822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Arnone, Robert, Sergio Derada, Sherwin Ladner, and Charles Trees. "Probing the subsurface ocean processes using ocean LIDARS." In SPIE Defense, Security, and Sensing, edited by Weilin W. Hou and Robert Arnone. SPIE, 2012. http://dx.doi.org/10.1117/12.921103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Yi, and Christopher D. Gianelli. "Notched spectrum: from probing waveforms to receive filters." In SPIE Defense, Security, and Sensing, edited by Edmund Zelnio and Frederick D. Garber. SPIE, 2013. http://dx.doi.org/10.1117/12.2016079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography