Littérature scientifique sur le sujet « Probing Security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Probing Security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Probing Security"
Adams, Jefferson. « Probing the East German State Security Archives ». International Journal of Intelligence and CounterIntelligence 13, no 1 (janvier 2000) : 21–34. http://dx.doi.org/10.1080/088506000304925.
Texte intégralMolteni, Maria Chiara, et Vittorio Zaccaria. « A relation calculus for reasoning about t-probing security ». Journal of Cryptographic Engineering 12, no 1 (26 février 2022) : 1–14. http://dx.doi.org/10.1007/s13389-022-00286-x.
Texte intégralBartz, Jennifer A., et Kristina Tchalova. « Probing the Opioidergic Basis of Attachment (In)security ». Biological Psychiatry : Cognitive Neuroscience and Neuroimaging 6, no 3 (mars 2021) : 256–58. http://dx.doi.org/10.1016/j.bpsc.2020.12.011.
Texte intégralBiswas, Liton Kumar, M. Shafkat M. Khan, Leonidas Lavdas et Navid Asadizanjani. « Security Assessment of Nonvolatile Memory Against Physical Probing ». EDFA Technical Articles 24, no 4 (1 novembre 2022) : 22–29. http://dx.doi.org/10.31399/asm.edfa.2022-4.p022.
Texte intégralRahman, M. Tanjidur, Nusrat Farzana Dipu, Dhwani Mehta, Shahin Tajik, Mark Tehranipoor et Navid Asadizanjani. « CONCEALING-Gate : Optical Contactless Probing Resilient Design ». ACM Journal on Emerging Technologies in Computing Systems 17, no 3 (25 juin 2021) : 1–25. http://dx.doi.org/10.1145/3446998.
Texte intégralGill, Sukhpal Singh, et Arash Shaghaghi. « Security-Aware Autonomic Allocation of Cloud Resources ». Journal of Organizational and End User Computing 32, no 3 (juillet 2020) : 15–22. http://dx.doi.org/10.4018/joeuc.2020070102.
Texte intégralSenn, Martin. « The art of constructing (in)security : probing rhetorical strategies of securitisation ». Journal of International Relations and Development 20, no 3 (31 mai 2017) : 605–30. http://dx.doi.org/10.1057/jird.2016.7.
Texte intégralBijalwan, Anchit, Vijender Kumar Solanki et Emmanuel Shubhakar Pilli. « BOTNET FORENSIC : ISSUES, CHALLENGES AND GOOD PRACTICES ». Network Protocols and Algorithms 10, no 2 (28 juin 2018) : 28. http://dx.doi.org/10.5296/npa.v10i2.13144.
Texte intégralLande, Dmitrii. « Construction domain model of information security by probing Google Scholar Citations service ». Collection "Information technology and security" 3, no 1 (30 juin 2015) : 4–11. http://dx.doi.org/10.20535/2411-1031.2015.3.1.57678.
Texte intégralWangdee, Wijarn, et Roy Billinton. « Probing the Intermittent Energy Resource Contributions From Generation Adequacy and Security Perspectives ». IEEE Transactions on Power Systems 27, no 4 (novembre 2012) : 2306–13. http://dx.doi.org/10.1109/tpwrs.2012.2204281.
Texte intégralThèses sur le sujet "Probing Security"
MOLTENI, MARIA CHIARA. « ON THE SECURITY OF CRYPTOGRAPHIC CIRCUITS:PROTECTION AGAINST PROBING ATTACKS AND PERFORMANCE IMPROVEMENT OF GARBLED CIRCUITS ». Doctoral thesis, Università degli Studi di Milano, 2022. http://hdl.handle.net/2434/920426.
Texte intégralQuist, Britton T. « Improved Channel Probing for Secret Key Generation with Multiple Antenna Systems ». BYU ScholarsArchive, 2013. https://scholarsarchive.byu.edu/etd/3554.
Texte intégralSeagraves, Philip. « A Multi-Factor Probit Analysis of Non-Performing Commercial Mortgage-Backed Security Loans ». Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/real_estate_diss/13.
Texte intégralKwon, Deukwoo. « Wavelet methods and statistical applications : network security and bioinformatics ». Texas A&M University, 2005. http://hdl.handle.net/1969.1/2654.
Texte intégralBasu, Nandita. « Pedestrian route choice behaviour : Influences of built environment on route preference, safety and security ». Thesis, Queensland University of Technology, 2022. https://eprints.qut.edu.au/236797/1/Thesis_Nandita%2BBasu_24112022.pdf.
Texte intégralChima, Chidiebere Daniel. « Socio-economic determinants of modern agricultural technology adoption in multiple food crops and its impact on productivity and food availability at the farm-level : a case study from south-eastern Nigeria ». Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3310.
Texte intégralBarrigas, Jorge Filipe. « Security Probes for Industrial Control Networks ». Master's thesis, 2014. http://hdl.handle.net/10316/35720.
Texte intégralDuring the last years, some of the attacks towards SCADA made headlines, helping raise awareness. Some of the vulnerabilities may even be exploited to harm other systems, eventually, ending compromising specific points of SCADA networks. At the same time, a growing number of threats related with the physical layer made new issues and low-level mechanisms emerged, requiring careful approach and monitoring to secure such devices. Threats of this type are considered to be even more dangerous than SCADA-specific ones, since these operate at a lower level, unnoticed to scanners and anti-viruses. Considering this scenario we can expect a growing number of these threats to be affecting SCADA components, if adequate countermeasures are not taken. Over the last ten months (from September 16, 2013 until June 27, 2014), a new concept was developed, in the context of the FP7 CockpitCI project, for the current thesis, to reinforce the security of SCADA systems. This concept refers to a device installed in a key juncture of the network, with the purpose of monitoring the behavior of specific components, while reporting detected anomalies. However, even before this thesis (during the second curriculum semester of the year 2012/2013) there was already some research being made in this sense, which reflects in the amount of results included in this document.
Shao, Li-Fang, et 邵莉芳. « Probing into the demand and supply between Enterprise Customers and Information Security Corporation ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/06085571173692574786.
Texte intégral元智大學
管理研究所
98
With the popularization of the Internet, information can be rapidly transmitted; however, what follows is the increase in security risk of information. Faced with the continuous emergence of information security events and ever-changing methods of attack, not only is the workload of information security managers increased, but also the difficulty in information security management. Therefore, enterprises and information security managers need more professional assistance and services to cope with these external information security threats. Information security corporations’ past model simply focusing on product selling can no longer meet customer needs. The operational strategy focusing on the service provision for products, development of service products, service-oriented operation, and provision of comprehensive information security service is inevitable. In order to present the value of service, information security corporations should give priority to the positioning of customer needs. Therefore, the main purposes of the study are to investigate how information security corporations should offer appropriate service to respond to current information security problems and meet customers’ expectation of “expectation meeting” and “problem solving,” and to summarize concrete strategies for them to offer services in the future. Case study method was used, and in-depth interviews were conducted to collect data. The subjects are the information security managers in three domestic large-scale enterprises and two technical advisers in information security corporations. Results indicated that the information security service that customers need is the customized service with overall planning framework, which is consistent with current environment, types and systems of information security events, as well as the instantaneous and immediate service and reporting of information security corporations. However, the most practical problem faced by enterprises is the limited budget for the installation of information security system. Suggestions on how information security corporations can try their best to meet customer needs with their limited budget are proposed as follows: information security corporations should develop newer technology, strengthen ability for problem positioning, and combine different services to provide more precise services, in the hope that the service quality can be increased and more efficient services meeting customer needs can be offered while minimization the labor costs.
Tu, Wei-Chin, et 杜偉欽. « The Research of Probing into The Security Management of Medical Institutes' Information based on HIPAA and ISO27001 ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/07085188054085544295.
Texte intégral國立成功大學
工程科學系專班
94
This research tries to assess the project as the content with 11 items in the norm of accessing of information security ISO27001, included 133 controlling measures, implement questionnaire, the norm of the information security management is proposed to accord with HIPAA bill, offering the reference of the information security to the medical treatment. With the development of computer information science and technology, the operation in daily of medical industry has used a lot of different information systems. It is the trend at the time today that the medical institute could exchange the mutual materials. The medical health organ uses the computer and network to increase the performance at job constantly. After studied the purpose, hope to involve into ISO27001 standard, but with the assessment of the HIPAA standard, administrative system concept of ISO27001 information security and practice to the information security, in which enable the medical institutes to make a good preparation in perfect to the structure of information security and application. The approach of research takes criteria of security deeply as the foundation and combined the norm of the information security in HIPAA bill with ISO27001. Applied 11 items ISO27001 to appraise project as content, it included 133 controlling measures implement of questionnaire’s method for main research approach to the materials collecting. And the subsidiary that is to establish the law of document and material, and interview, and then understanding the domestic information security of the higher level medical institutes carrying out at present situation. Using Excel to sum up and to organize the internal personnel has the practical factor that is about the problem in the incident of information. Accessing the normal demand by ISO27001 message is safely. In order to offer it in conformity with the strategy, proposing the higher level medical institutes is to improve the present situation or set up the administrative system of the information security. The hope is according with the environment of the international standard’s information security that the medical institutes' construction in the future to set out. It will take precautions against the emergence of the crisis of information security in advance. It has been found that although all medical institutes at present have already promoted the informationization, but the policy of information security has not implemented the staff of other departments. It produced the fact that Ann's accident of the money happened occasionally, so there should strengthen staff information security education, and medical institute should plan with accident. Owing to it in conformity with the draft with drilling norm to meet an emergency will be strengthen, implement information assets’ risk analysis and work of risk management in medical institutes.
FU, GONG DE, et 龔德富. « Emergency of probing into security policeman's crisis management to the masses activity of ' three cases ' that taken the place of by the people or the political party personage gets involved - take security policeman's X group as an exampleEmergency o ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/36484299301048224770.
Texte intégral高苑科技大學
經營管理研究所
96
Because domestic recently different political parties, confront with each other with the political idea, the masses activity was frequent,the right that en suring people's gathering, parading in accordance with the constitution, should consider under national security, social common justice, civil order, public interests, security policeman how machine dredge place, with administer the state according to law, position of ' administrative neutrality ' first, divide party groupings, identity, background, Zheng Yan enforce the law, remove flat conflict on invisible, it is undoubtedly that security policeman deals with the key that the masses move about. Research this probe into security policeman X group deal with masses activity, set out to conflict situation ' 3 cases ',etc.topic mainly, is it resist between conflict and security policeman influence and security policeman of emergency, crisis of management in the face of the conflict of resisting to get involved with popular representative or political party personage, about conflict sit uation, for core communicate coordinate, crisis management in advance, in the thing and prepare and question of handling etc.afterwards, visit hardworking Kaohsjung of the association (institute has jurisdiction over) Security pol iceman X of city old team member alert to deal with masses activity in the face of conflict situation,etc. at the topic, security policeman about conflict it handle,it plan, not handle among thing in advance,thing aftertreatment,etc. crisis management meet an emergency as discussion, sum up and is it discuss and make conclusion and suggestion to analyse, is it make in the future dealing with similar masses activity resist crisis, conflict of incident manage reference that meet an emergency to support. This research is with Kendall's harmonious coefficient (the.Kendall coefficient of oncordance) . Analyse three case (case point mercury mud transport back to platform mould Kaohsjung benevolence military factory people enclose the in cident of resisting of factory; The case is the third great explosion in half a year of factory of Kaohsjung of oil in the forefinger; Stamina people enclose theincident of resisting of factory; Case three refer to 918 person create disturbances to emergency, conflict of course handle) ,Whether the rank to five questions is apparent, propose the investigation result, prove, and then leave the age, age and service seniority and the views of three literary composition surfaces to the crisis of rank of duty, prove security policeman's X group manages the adaptability to changes to the crisis of the masses activity, and assay and analyse, probes into the parameters of people with F: Age (5 grades) , the age and service seniority (5 grades) And duty grade (5 grades) ,Each deal with and thing aftertreatment planning in advance, thing, are three literary composition surface views the same? Learnt by the result of study, 1 case, 2 case, 3 case is it show to five topic relevant to have in ' three case ', at the age of the parameters of people (5 grades) , the age and service seniority (five grades) And duty grade (5 grades) Whether to constructing the Taxi view, there are differences.
Livres sur le sujet "Probing Security"
Wesley, Michael. Between probity and proficiency : Challenge and change within the Australian intelligence community = Probité et compétence : défis et changements au sein de l'appareil australien du renseignement. Ottawa, Ont : Canadian Security Intelligence Service = Service canadien du renseignement de sécurité, 2006.
Trouver le texte intégralCavelty, Myriam Dunn, Ursula Jasper et Andreas Wenger. Politics and Science of Prevision : Governing and Probing the Future. Taylor & Francis Group, 2020.
Trouver le texte intégralCavelty, Myriam Dunn, Ursula Jasper et Andreas Wenger. Politics and Science of Prevision : Governing and Probing the Future. Taylor & Francis Group, 2020.
Trouver le texte intégralBashevkin, Sylvia. Women as Foreign Policy Leaders. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190875374.001.0001.
Texte intégralChapitres de livres sur le sujet "Probing Security"
Cassiers, Gaëtan. « Probing Model ». Dans Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_1699-1.
Texte intégralSchmidt, Jörn-Marc, et Chong Hee Kim. « A Probing Attack on AES ». Dans Information Security Applications, 256–65. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00306-6_19.
Texte intégralCarlet, Claude, Emmanuel Prouff, Matthieu Rivain et Thomas Roche. « Algebraic Decomposition for Probing Security ». Dans Lecture Notes in Computer Science, 742–63. Berlin, Heidelberg : Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47989-6_36.
Texte intégralCassiers, Gaëtan, Sebastian Faust, Maximilian Orlt et François-Xavier Standaert. « Towards Tight Random Probing Security ». Dans Advances in Cryptology – CRYPTO 2021, 185–214. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_7.
Texte intégralTajik, Shahin. « Optical Contactless Probing ». Dans On the Physical Security of Physically Unclonable Functions, 55–69. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75820-6_6.
Texte intégralShi, Qihang, Domenic Forte et Mark M. Tehranipoor. « Analyzing Circuit Layout to Probing Attack ». Dans Hardware IP Security and Trust, 73–98. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-49025-0_5.
Texte intégralLiu, Feng-Hao, et Anna Lysyanskaya. « Algorithmic Tamper-Proof Security under Probing Attacks ». Dans Lecture Notes in Computer Science, 106–20. Berlin, Heidelberg : Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15317-4_8.
Texte intégralLuo, Yang, Qingni Shen, Cong Li, Kang Chen et Zhonghai Wu. « Probing the Scheduling Algorithms in the Cloud Based on OpenStack ». Dans Cloud Computing and Security, 510–20. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27051-7_44.
Texte intégralTakarabt, Sofiane, Sylvain Guilley, Youssef Souissi, Laurent Sauvage et Yves Mathieu. « Post-layout Security Evaluation Methodology Against Probing Attacks ». Dans Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 465–82. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77424-0_37.
Texte intégralBou-Harb, Elias, et Claude Fachkha. « On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns ». Dans Computer and Network Security Essentials, 461–74. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_26.
Texte intégralActes de conférences sur le sujet "Probing Security"
Göktas, Enes, Kaveh Razavi, Georgios Portokalidis, Herbert Bos et Cristiano Giuffrida. « Speculative Probing ». Dans CCS '20 : 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3372297.3417289.
Texte intégralKoehler, Chase, Divita Mathur, Eric Henderson et Robyn Lutz. « Probing the Security of DNA Origami ». Dans 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 2018. http://dx.doi.org/10.1109/issrew.2018.00-14.
Texte intégralYoder, Theodore J., et Michael R. Frey. « Probing correlation in quantum arrays ». Dans SPIE Defense, Security, and Sensing. SPIE, 2012. http://dx.doi.org/10.1117/12.919135.
Texte intégralMartin, James S., Waymond R. Scott, Jr., Gregg D. Larson, Peter H. Rogers et George S. McCall II. « Probing signal design for seismic landmine detection ». Dans Defense and Security, sous la direction de Russell S. Harmon, J. Thomas Broach et John H. Holloway, Jr. SPIE, 2004. http://dx.doi.org/10.1117/12.542554.
Texte intégralFlores, Lilia Gomez, Sandra Wilson et Dougie Kinnear. « Probing identity management ». Dans CCS'13 : 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2013. http://dx.doi.org/10.1145/2517881.2517888.
Texte intégralMolteni, Maria Chiara, Vittorio Zaccaria et Valentina Ciriani. « ADD-based Spectral Analysis of Probing Security ». Dans 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022. http://dx.doi.org/10.23919/date54114.2022.9774700.
Texte intégralLi, YongGang, Yeh-Ching Chung, Jinbiao Xing, Yu Bao et Guoyuan Lin. « MProbe : Make the code probing meaningless ». Dans ACSAC : Annual Computer Security Applications Conference. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3564625.3567967.
Texte intégralBesson, Frédéric, Alexandre Dang et Thomas Jensen. « Securing Compilation Against Memory Probing ». Dans CCS '18 : 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3264820.3264822.
Texte intégralArnone, Robert, Sergio Derada, Sherwin Ladner et Charles Trees. « Probing the subsurface ocean processes using ocean LIDARS ». Dans SPIE Defense, Security, and Sensing, sous la direction de Weilin W. Hou et Robert Arnone. SPIE, 2012. http://dx.doi.org/10.1117/12.921103.
Texte intégralJiang, Yi, et Christopher D. Gianelli. « Notched spectrum : from probing waveforms to receive filters ». Dans SPIE Defense, Security, and Sensing, sous la direction de Edmund Zelnio et Frederick D. Garber. SPIE, 2013. http://dx.doi.org/10.1117/12.2016079.
Texte intégral