Academic literature on the topic 'Security systems Mathematics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security systems Mathematics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security systems Mathematics"
Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.
Full textShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Full textBokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.
Full textStyugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.
Full textAra, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.
Full textBin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.
Full textAdebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.
Full textGadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.
Full textStefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.
Full textMamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.
Full textDissertations / Theses on the topic "Security systems Mathematics"
Singh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.
Full textBig data har använts regelbundet inom ekonomi för att bygga prognosmodeller, det är dock ett relativt nytt koncept inom säkerhetsbranschen. Denna studie förutsäger vilka larmkoder som kommer att låta under de kommande 7 dagarna på plats $L$ genom att observera de senaste 7 dagarna. Logistisk regression och neurala nätverk används för att lösa detta problem. Eftersom att problemet är av en multi-label natur tillämpas logistisk regression i kombination med binary relevance och classifier chains. Modellerna tränas på data som har annoterats med två separata metoder. Den första metoden annoterar datan genom att endast observera plats $L$ och den andra metoden betraktar $L$ och $L$:s omgivning. Eftersom problemet är multi-labeled kommer annoteringen sannolikt att vara obalanserad och därför används resamplings metoden, SMOTE, och random over-sampling för att öka frekvensen av minority labels. Recall, precision och F1-score mättes för att utvärdera modellerna. Resultaten visar att den andra annoterings metoden presterade bättre för alla modeller och att classifier chains och binary relevance presterade likartat. Binary relevance och classifier chains modellerna som tränades på datan som använts sig av resamplings metoden SMOTE gav ett högre macro average F1-score, dock sjönk prestationen för neurala nätverk. Resamplings metoden SMOTE presterade även bättre än random over-sampling. Neurala nätverksmodellen överträffade de andra två modellerna på alla metoder och uppnådde högsta F1-score.
Bengtsson, Mattias. "Mathematical foundation needed for development of IT security metrics." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9766.
Full textIT security metrics are used to achieve an IT security assessment of certain parts of the IT security environment. There is neither a consensus of the definition of an IT security metric nor a natural scale type of the IT security. This makes the interpretation of the IT security difficult. To accomplish a comprehensive IT security assessment one must aggregate the IT security values to compounded values.
When developing IT security metrics it is important that permissible mathematical operations are made so that the information are maintained all the way through the metric. There is a need for a sound mathematical foundation for this matter.
The main results produced by the efforts in this thesis are:
• Identification of activities needed for IT security assessment when using IT security metrics.
• A method for selecting a set of security metrics in respect to goals and criteria, which also is used to
• Aggregate security values generated from a set of security metrics to compounded higher level security values.
• A mathematical foundation needed for development of security metrics.
Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.
Full textLi, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Full textAgarwal, Akash. "A Study of Communication Link Removal in Static and Dynamic Teams." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1510680159436136.
Full textTerashima, Robert Seth. "Tweakable Ciphers: Constructions and Applications." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2484.
Full textGoeschel, Kathleen. "Feature Set Selection for Improved Classification of Static Analysis Alerts." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1091.
Full textFung, Charles Way Hun. "Multi-marcação de vídeo baseada em marca d'água LWT-SVD usando abordagem lateral." Universidade Tecnológica Federal do Paraná, 2012. http://repositorio.utfpr.edu.br/jspui/handle/1/328.
Full textVídeos digitais se tornaram uma forma de comunicação altamente utilizada na rede, entretanto estes dados são facilmente copiados e distribuídos. Isto se deve ao crescente número de ferramentas que surgiram com este objetivo, causando quebra dos direitos autorais e distribuição ilegal de conteúdo. A solução mais estudada para este problema são as marcas d'água digitais, que provêm segurança em forma de autenticação e verificação de violação. Neste trabalho, foi desenvolvido um novo método de inserção e extração de marcas d'água em um vídeo, usando o processo chamado abordagem lateral. Este possibilita a marcação em blocos de frames. As diversas marcas inseridas são usadas como redundância para aumentar a robustez contra ataques. Os testes realizados seguiram o padrão dos benchmarks Vidmark e Stirmark, os quais demonstram a eficiência do método em manter a marca d'água mesmo após ataques.
Digital videos have become the most used way to communicate, however these data are easily copied and distributed. That happen due the growing number of tools that are create with this goal, causing breach of copyright and illegal distribution of content. The most studied solution that can solve this problem are the digital watermarks that provide security like authentication and tamper detection. In this work, we developed a new method of embedding and extracting watermarks in a video using a process called side view. This process allows watermark a block of frames. The several watermarks embedded can be used like redundance to grow the robustness of the method against attacks. The tests followed the standard benchmarks Vidmark and Stirmark that show the performance of the method in keep the watermark even after attacks.
Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full textSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Full textBooks on the topic "Security systems Mathematics"
Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textSecurity engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Find full textSecurity engineering: A guide to building dependable distributed systems. New York: Wiley, 2001.
Find full text1955-, Kachyns'kyi A. B., ed. Systemno-kont︠s︡eptualʹni zasady stratehiï nat︠s︡ionalʹnoï bezpeky Ukraïny. Kyïv: I︠E︡vroatlantykinform, 2007.
Find full textInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Find full textInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Find full text1972-, Ito Takayuki, ed. Rational, robust, and secure negotiations in multi-agent systems. Berlin: Springer, 2008.
Find full textPaolo, Gastaldo, Zunino Rodolfo, Corchado Emilio, and SpringerLink (Online service), eds. Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Find full textPierre, Plamondon, International Labour Office, and International Social Security Association, eds. Actuarial practice in social security. Geneva: International Labour Office, 2002.
Find full textBook chapters on the topic "Security systems Mathematics"
Walter, Max, and Carsten Trinitis. "Quantifying the Security of Composed Systems." In Parallel Processing and Applied Mathematics, 1026–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11752578_124.
Full textPanagopoulos, D., and S. Hassapis. "A Short Exposition of Topological Applications to Security Systems." In Applications of Mathematics and Informatics in Science and Engineering, 189–98. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04720-1_12.
Full textGąsior, Jakub, Franciszek Seredyński, and Andrei Tchernykh. "A Security-Driven Approach to Online Job Scheduling in IaaS Cloud Computing Systems." In Parallel Processing and Applied Mathematics, 156–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78054-2_15.
Full textEickmann, Jonas, Christian Bredtmann, and Albert Moser. "Security-Constrained Optimization Framework for Large-Scale Power Systems Including Post-contingency Remedial Actions and Inter-temporal Constraints." In Trends in Mathematics, 47–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51795-7_4.
Full textVert, Gregory, Ann Leslie Claesson-Vert, Jesse Roberts, and Erica Bott. "A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics." In Computer and Network Security Essentials, 41–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_3.
Full textGreen, Sam, Craig M. Vineyard, and Çetin Kaya Koç. "Mathematical Optimizations for Deep Learning." In Cyber-Physical Systems Security, 69–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_4.
Full textPrajapati, Apeksha. "Mathematical Analysis of Effectiveness of Security Patches in Securing Wireless Sensor Network." In Advances in Intelligent Systems and Computing, 143–55. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8222-2_12.
Full textGollmann, Dieter. "Security for Cyber-Physical Systems." In Mathematical and Engineering Methods in Computer Science, 12–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36046-6_2.
Full textKatal, A. "Security and Privacy in Mobile Cloud Computing." In Mathematical Modeling for Intelligent Systems, 17–33. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003291916-2.
Full textFranzen, Dietmar. "Incomplete Contracts and Security Design." In Lecture Notes in Economics and Mathematical Systems, 45–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56932-6_3.
Full textConference papers on the topic "Security systems Mathematics"
Feng Liu and Guodong Shi. "Nonlinear mathematics model and stability for social security systems." In 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE, 2010. http://dx.doi.org/10.1109/iske.2010.5680846.
Full textTarek, Nouioua, and Belbachir Ahmed Hafid. "The Quantum Computer and the Security of Information Systems." In 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). IEEE, 2021. http://dx.doi.org/10.1109/icrami52622.2021.9585929.
Full textKapralyakov, Petko, George Venkov, Ralitza Kovacheva, and Vesela Pasheva. "Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations." In APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE '11): Proceedings of the 37th International Conference. AIP, 2011. http://dx.doi.org/10.1063/1.3664389.
Full textAbdulmunem, Al-Sudani Mustafa Qahtan, and Vyacheslav S. Kharchenko. "Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models." In 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI). IEEE, 2016. http://dx.doi.org/10.1109/mcsi.2016.062.
Full textBijelić, Zdravko, Biljana Milanović, and Mitar Bijelić. "Model of Optimal System Management in the Military Process Industry in the Conditions of the COVID-19 Pandemic." In 34th International Congress on Process Industry. SMEITS, 2021. http://dx.doi.org/10.24094/ptk.021.34.1.67.
Full textGoodman, Jacob M., Jinho Kim, S. Andrew Gadsden, and Stephen A. Wilkerson. "System and mathematical modeling of quadrotor dynamics." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Grant R. Gerhart. SPIE, 2015. http://dx.doi.org/10.1117/12.2185196.
Full textNovikov, O. P., and M. O. Novikov. "Mathematical model of the frame security system." In Global science. Development and novelty. L-Journal, 2020. http://dx.doi.org/10.18411/gsdn-25-12-2020-07.
Full textЯркова, Ольга Николаевна, Анастасия Сергеевна Яркова, and Алена Владимировна Труфанова. "MATHEMATICAL MODELING OF INVESTMENT ALLOCATION STRATEGY FOR INFORMATION SECURITY SYSTEM ORGANIZATION." In Сборник избранных статей по материалам научных конференций ГНИИ “Нацразвитие” (Санкт-Петербург, Апрель 2020). Crossref, 2020. http://dx.doi.org/10.37539/apr290.2020.51.32.009.
Full textDuisebekova, K. S., and T. Duisebekov. "Utilization of Fuzzy Mathematics for Security Model of a System." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747158.
Full textLi, Zhongwen, and Yang Xiang. "Mathematical Analysis of Active DDoS Defense Systems." In 2006 International Conference on Computational Intelligence and Security. IEEE, 2006. http://dx.doi.org/10.1109/iccias.2006.295324.
Full textReports on the topic "Security systems Mathematics"
Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, June 2022. http://dx.doi.org/10.46337/220602.
Full textUnal, Beyza, Julia Cournoyer, Calum Inverarity, and Yasmin Afina. Uncertainty and complexity in nuclear decision-making. Royal Institute of International Affairs, March 2022. http://dx.doi.org/10.55317/9781784135157.
Full textSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.
Full textData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Full text