Literatura académica sobre el tema "Metric Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Metric Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Metric Security"
Neto, Afonso Araújo y Marco Vieira. "Benchmarking Untrustworthiness". International Journal of Dependable and Trustworthy Information Systems 1, n.º 2 (abril de 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Texto completoShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan y Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability". Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Texto completoDíaz, Álvaro, Javier González-Bayon y Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator". Journal of Circuits, Systems and Computers 25, n.º 07 (22 de abril de 2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Texto completoYee, George O. M. "Designing Sound Security Metrics". International Journal of Systems and Software Security and Protection 10, n.º 1 (enero de 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Texto completoShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu y Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security". Security and Communication Networks 2021 (24 de agosto de 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Texto completoTjirare, D. y F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia". Namibian Journal for Research, Science and Technology 1, n.º 1 (16 de octubre de 2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Texto completoJouini, Mouna y Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems". International Journal of Organizational and Collective Intelligence 4, n.º 3 (julio de 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Texto completoLe, Ngoc Thuy y Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, n.º 1 (30 de marzo de 2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Texto completoKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi y Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products". Indian Journal of Science and Technology 8, S8 (1 de abril de 2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Texto completoIto, Kosuke, Shuji Morisaki y Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines". IoT 2, n.º 4 (15 de diciembre de 2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Texto completoTesis sobre el tema "Metric Security"
Khan, Moazzam. "Security metric based risk assessment". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.
Texto completoOwusu-Kesseh, Daniel. "The Relative Security Metric of Information Systems: Using AIMD Algorithms". University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1462278857.
Texto completoKarabey, Bugra. "Attack Tree Based Information Technology Security Metric Integrating Enterprise Objectives With Vulnerabilities". Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614100/index.pdf.
Texto completoErturk, Volkan. "A Framework Based On Continuous Security Monitoring". Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12610139/index.pdf.
Texto completoRich, Ronald P. y Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.
Texto completoApproved for public release; distribution is unlimited
A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.
Lieutenant, United States Navy
Lieutenant, United States Navy
Zhou, Luyuan. "Security Risk Analysis based on Data Criticality". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.
Texto completoHolmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.
Texto completoThesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
Homer, John. "A comprehensive approach to enterprise network security management". Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Texto completoBilal, Muhammad y Ganesh Sankar. "Trust & Security issues in Mobile banking and its effect on Customers". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3166.
Texto completoUsing mobile phones for mobile banking, customers can push or pull the details like Funds transfer, Bill payment, Share trade, Check order and also inquiries like Account balance, Account statement and Check status Transaction history etc. It means that the customer is interacting with the files, databases etc., of the bank . Database at the server end is sensitive in terms of security. Customers distrust mobile devices to transfer money or for making any transactions. The reason is that security is a major concern for the customer’s fulfillment. Customer’s main concern in using mobile devices for mobile banking is the authentication method used to ensure that the right person is accessing the services like transaction etc.The authors made a basic model for mobile banking transaction. All security risks were included in the transaction model. Then the authors focused on authentication method. By literature review and interview it was concluded that security can be improved by bio metric methods. The authors focused on different bio-metric mechanism and concluded that fingerprint mechanism is more suitable as it requires less storage capacity in database and identifies the uniqueness of customers. The authors suggest a possible solution by proposing finger-print mechanism model and designed a bio-metric scanning device as a solution through which customer can interact with banking system using their finger-print. The result of workshop shows that bio-metric finger print mechanism is more suitable and secure then other authentication methods for mobile banking.
004531847791
Taylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.
Texto completoLibros sobre el tema "Metric Security"
Wang, Lingyu, Sushil Jajodia y Anoop Singhal. Network Security Metrics. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4.
Texto completoSecurity metrics: A beginner's guide. New York: McGraw-Hill, 2012.
Buscar texto completoMetrics and methods for security risk management. Amsterdam: Syngress/Elsevier, 2010.
Buscar texto completoComplete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.
Buscar texto completoIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Buscar texto completoIT security metrics: A practical framework for measuring security & protecting data. New York: McGraw Hill, 2010.
Buscar texto completoP, Halibozek Edward, ed. Security metrics management: How to measure the costs and benefits of security. Burlington, MA: Butterworth-Heinemann, 2006.
Buscar texto completoBrotby, W. Krag. Information security management metrics: A definitive guide to effective security monitoring and measurement. Boca Raton: Auerbach Publications, 2009.
Buscar texto completoContinuous authentication using biometrics: Data, models, and metrics. Hershey, PA: Information Science Reference, 2012.
Buscar texto completoSademies, Anni. Process approach to information security metrics in Finnish industry and state institutions. Espoo [Finland]: VTT Technical Research Centre of Finland, 2004.
Buscar texto completoCapítulos de libros sobre el tema "Metric Security"
Whyte, Mark y Chris Johnson. "Security and counter-terrorism". En Metric Handbook, 36–1. 7a ed. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003052586-39.
Texto completoWhyte, Mark y Chris Johnson. "Security and counter-terrorism". En Metric Handbook, 683–95. Sixth edition. | New York: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315230726-37.
Texto completoJØsang, Audun. "A subjective metric of authentication". En Computer Security — ESORICS 98, 329–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055873.
Texto completoGanesan, Rajesh, Ankit Shah, Sushil Jajodia y Hasan Cam. "A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center". En Network Security Metrics, 177–207. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_8.
Texto completoPham, Dang Vinh y Dogan Kesdogan. "A Combinatorial Approach for an Anonymity Metric". En Information Security and Privacy, 26–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_3.
Texto completoBouyahia, Tarek, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens y Fabien Autrel. "Metric for Security Activities Assisted by Argumentative Logic". En Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 183–97. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9_12.
Texto completoYahya, Fara, Robert J. Walters y Gary B. Wills. "Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage". En Enterprise Security, 223–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54380-2_10.
Texto completoCasola, Valentina, Alessandra De Benedictis, Massimiliano Rak y Umberto Villano. "A Security Metric Catalogue for Cloud Applications". En Advances in Intelligent Systems and Computing, 854–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61566-0_81.
Texto completoWang, Lingyu, Tania Islam, Tao Long, Anoop Singhal y Sushil Jajodia. "An Attack Graph-Based Probabilistic Security Metric". En Lecture Notes in Computer Science, 283–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70567-3_22.
Texto completoLe Thanh Thai, Binh y Hidema Tanaka. "A Novel Metric for Password Security Risk Against Dictionary Attacks". En Information Security Applications, 291–302. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25659-2_21.
Texto completoActas de conferencias sobre el tema "Metric Security"
Preece, Bradley L. y Eric A. Flug. "A wavelet contrast metric for the targeting task performance metric". En SPIE Defense + Security, editado por Gerald C. Holst y Keith A. Krapels. SPIE, 2016. http://dx.doi.org/10.1117/12.2223855.
Texto completoMozhaev, Oleksandr, Heorgii Kuchuk, Nina Kuchuk, Mykhailo Mozhaev y Mykhailo Lohvynenko. "Multiservice network security metric". En 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2017. http://dx.doi.org/10.1109/aiact.2017.8020083.
Texto completoRodes, Benjamin D., John C. Knight y Kimberly S. Wasson. "A security metric based on security arguments". En the 5th International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2593868.2593880.
Texto completoMcIntosh, John C. y Candace E. Clary. "Bistatic SAR imaging geometry performance metric". En Defense and Security, editado por Edmund G. Zelnio y Frederick D. Garber. SPIE, 2004. http://dx.doi.org/10.1117/12.542114.
Texto completoTupper, Melanie y A. Nur Zincir-Heywood. "VEA-bility Security Metric: A Network Security Analysis Tool". En 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.138.
Texto completoHashemi, Seyed Mahmood y Jingsha He. "An evolutionary approach for security metric". En 2015 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2015. http://dx.doi.org/10.1109/ictc.2015.7354776.
Texto completoChandra, S. y R. A. Khan. "Software security metric identification framework (SSM)". En the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523250.
Texto completoŠišejković, Dominik, Rainer Leupers, Gerd Ascheid y Simon Metzner. "A Unifying logic encryption security metric". En SAMOS XVIII: Architectures, Modeling, and Simulation. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3229631.3229636.
Texto completoKarabey, Bugra y Nazife Baykal. "Information security metric integrating enterprise objectives". En 2009 International Carnahan Conference on Security Technology (ICCST). IEEE, 2009. http://dx.doi.org/10.1109/ccst.2009.5335549.
Texto completoNeto, Afonso Araujo y Marco Vieira. "Untrustworthiness: A trust-based security metric". En 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/crisis.2009.5411967.
Texto completoInformes sobre el tema "Metric Security"
Jansen, Wayne. Directions in security metrics research. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.
Texto completoSwanson, M., N. Bartol, J. Sabato, J. Hash y L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Texto completoLippmann, R. P., J. F. Riordan, T. H. Yu y K. K. Watson. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2012. http://dx.doi.org/10.21236/ada565825.
Texto completoMonev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics. Institute of Information and Communication Technologies, marzo de 2014. http://dx.doi.org/10.11610/it4sec.0111.
Texto completoWayne F. Boyer y Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), mayo de 2008. http://dx.doi.org/10.2172/935471.
Texto completoBlack, Paul E., Michael Kass y Elizabeth Fong. Proceedings of workshop on software security assurance tools, techniques, and metrics. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.500-265.
Texto completoHoaglund, Robert y Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, enero de 2007. http://dx.doi.org/10.21236/ada471403.
Texto completoWilliams, Laurie. On the Use of Software Metrics as a Predictor of Software Security Problems. Fort Belvoir, VA: Defense Technical Information Center, enero de 2013. http://dx.doi.org/10.21236/ada581470.
Texto completoBlack, Paul E. y Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, noviembre de 2016. http://dx.doi.org/10.6028/nist.sp.500-320.
Texto completoPerdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, septiembre de 2021. http://dx.doi.org/10.46337/210930.
Texto completo