Gotowa bibliografia na temat „Metric Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Metric Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Metric Security"
Neto, Afonso Araújo, i Marco Vieira. "Benchmarking Untrustworthiness". International Journal of Dependable and Trustworthy Information Systems 1, nr 2 (kwiecień 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Pełny tekst źródłaShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan i Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability". Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Pełny tekst źródłaDíaz, Álvaro, Javier González-Bayon i Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator". Journal of Circuits, Systems and Computers 25, nr 07 (22.04.2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Pełny tekst źródłaYee, George O. M. "Designing Sound Security Metrics". International Journal of Systems and Software Security and Protection 10, nr 1 (styczeń 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Pełny tekst źródłaShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu i Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security". Security and Communication Networks 2021 (24.08.2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Pełny tekst źródłaTjirare, D., i F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia". Namibian Journal for Research, Science and Technology 1, nr 1 (16.10.2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Pełny tekst źródłaJouini, Mouna, i Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems". International Journal of Organizational and Collective Intelligence 4, nr 3 (lipiec 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Pełny tekst źródłaLe, Ngoc Thuy, i Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, nr 1 (30.03.2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Pełny tekst źródłaKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi i Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products". Indian Journal of Science and Technology 8, S8 (1.04.2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Pełny tekst źródłaIto, Kosuke, Shuji Morisaki i Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines". IoT 2, nr 4 (15.12.2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Pełny tekst źródłaRozprawy doktorskie na temat "Metric Security"
Khan, Moazzam. "Security metric based risk assessment". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47527.
Pełny tekst źródłaOwusu-Kesseh, Daniel. "The Relative Security Metric of Information Systems: Using AIMD Algorithms". University of Cincinnati / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1462278857.
Pełny tekst źródłaKarabey, Bugra. "Attack Tree Based Information Technology Security Metric Integrating Enterprise Objectives With Vulnerabilities". Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12614100/index.pdf.
Pełny tekst źródłaErturk, Volkan. "A Framework Based On Continuous Security Monitoring". Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/12610139/index.pdf.
Pełny tekst źródłaRich, Ronald P., i Jonathan S. Holmgren. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1102.
Pełny tekst źródłaApproved for public release; distribution is unlimited
A of the NP, but the key requirement for Certification and Accreditation is the creation of a Protection Profile and an understanding of the DITSCAP requirements and process. This thesis creates a Protection Profile for the NP along with a draft Type SSAA for Certification and Accreditation of the NP.
Lieutenant, United States Navy
Lieutenant, United States Navy
Zhou, Luyuan. "Security Risk Analysis based on Data Criticality". Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-93055.
Pełny tekst źródłaHolmgren, Jonathan S. Rich Ronald P. "Metric methodology for the creation of environments and processes to certify a component : specifically the Naval Research Laboratory Pump /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FHolmgren.pdf.
Pełny tekst źródłaThesis advisor(s): George Dinolt, Craig Rasmussen. Includes bibliographical references (p. 155-157). Also available online.
Homer, John. "A comprehensive approach to enterprise network security management". Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Pełny tekst źródłaBilal, Muhammad, i Ganesh Sankar. "Trust & Security issues in Mobile banking and its effect on Customers". Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3166.
Pełny tekst źródłaUsing mobile phones for mobile banking, customers can push or pull the details like Funds transfer, Bill payment, Share trade, Check order and also inquiries like Account balance, Account statement and Check status Transaction history etc. It means that the customer is interacting with the files, databases etc., of the bank . Database at the server end is sensitive in terms of security. Customers distrust mobile devices to transfer money or for making any transactions. The reason is that security is a major concern for the customer’s fulfillment. Customer’s main concern in using mobile devices for mobile banking is the authentication method used to ensure that the right person is accessing the services like transaction etc.The authors made a basic model for mobile banking transaction. All security risks were included in the transaction model. Then the authors focused on authentication method. By literature review and interview it was concluded that security can be improved by bio metric methods. The authors focused on different bio-metric mechanism and concluded that fingerprint mechanism is more suitable as it requires less storage capacity in database and identifies the uniqueness of customers. The authors suggest a possible solution by proposing finger-print mechanism model and designed a bio-metric scanning device as a solution through which customer can interact with banking system using their finger-print. The result of workshop shows that bio-metric finger print mechanism is more suitable and secure then other authentication methods for mobile banking.
004531847791
Taylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.
Pełny tekst źródłaKsiążki na temat "Metric Security"
Wang, Lingyu, Sushil Jajodia i Anoop Singhal. Network Security Metrics. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4.
Pełny tekst źródłaSecurity metrics: A beginner's guide. New York: McGraw-Hill, 2012.
Znajdź pełny tekst źródłaMetrics and methods for security risk management. Amsterdam: Syngress/Elsevier, 2010.
Znajdź pełny tekst źródłaComplete Guide to Security and Privacy Metrics. London: Taylor and Francis, 2007.
Znajdź pełny tekst źródłaIT security governance guidebook with security program metrics on CD-ROM. Boca Raton, FL: Auerbach Publications/Taylor & Francis, 2007.
Znajdź pełny tekst źródłaIT security metrics: A practical framework for measuring security & protecting data. New York: McGraw Hill, 2010.
Znajdź pełny tekst źródłaP, Halibozek Edward, red. Security metrics management: How to measure the costs and benefits of security. Burlington, MA: Butterworth-Heinemann, 2006.
Znajdź pełny tekst źródłaBrotby, W. Krag. Information security management metrics: A definitive guide to effective security monitoring and measurement. Boca Raton: Auerbach Publications, 2009.
Znajdź pełny tekst źródłaContinuous authentication using biometrics: Data, models, and metrics. Hershey, PA: Information Science Reference, 2012.
Znajdź pełny tekst źródłaSademies, Anni. Process approach to information security metrics in Finnish industry and state institutions. Espoo [Finland]: VTT Technical Research Centre of Finland, 2004.
Znajdź pełny tekst źródłaCzęści książek na temat "Metric Security"
Whyte, Mark, i Chris Johnson. "Security and counter-terrorism". W Metric Handbook, 36–1. Wyd. 7. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003052586-39.
Pełny tekst źródłaWhyte, Mark, i Chris Johnson. "Security and counter-terrorism". W Metric Handbook, 683–95. Sixth edition. | New York: Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315230726-37.
Pełny tekst źródłaJØsang, Audun. "A subjective metric of authentication". W Computer Security — ESORICS 98, 329–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055873.
Pełny tekst źródłaGanesan, Rajesh, Ankit Shah, Sushil Jajodia i Hasan Cam. "A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center". W Network Security Metrics, 177–207. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_8.
Pełny tekst źródłaPham, Dang Vinh, i Dogan Kesdogan. "A Combinatorial Approach for an Anonymity Metric". W Information Security and Privacy, 26–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02620-1_3.
Pełny tekst źródłaBouyahia, Tarek, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens i Fabien Autrel. "Metric for Security Activities Assisted by Argumentative Logic". W Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 183–97. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9_12.
Pełny tekst źródłaYahya, Fara, Robert J. Walters i Gary B. Wills. "Using Goal-Question-Metric (GQM) Approach to Assess Security in Cloud Storage". W Enterprise Security, 223–40. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54380-2_10.
Pełny tekst źródłaCasola, Valentina, Alessandra De Benedictis, Massimiliano Rak i Umberto Villano. "A Security Metric Catalogue for Cloud Applications". W Advances in Intelligent Systems and Computing, 854–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61566-0_81.
Pełny tekst źródłaWang, Lingyu, Tania Islam, Tao Long, Anoop Singhal i Sushil Jajodia. "An Attack Graph-Based Probabilistic Security Metric". W Lecture Notes in Computer Science, 283–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-70567-3_22.
Pełny tekst źródłaLe Thanh Thai, Binh, i Hidema Tanaka. "A Novel Metric for Password Security Risk Against Dictionary Attacks". W Information Security Applications, 291–302. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-25659-2_21.
Pełny tekst źródłaStreszczenia konferencji na temat "Metric Security"
Preece, Bradley L., i Eric A. Flug. "A wavelet contrast metric for the targeting task performance metric". W SPIE Defense + Security, redaktorzy Gerald C. Holst i Keith A. Krapels. SPIE, 2016. http://dx.doi.org/10.1117/12.2223855.
Pełny tekst źródłaMozhaev, Oleksandr, Heorgii Kuchuk, Nina Kuchuk, Mykhailo Mozhaev i Mykhailo Lohvynenko. "Multiservice network security metric". W 2017 2nd International Conference on Advanced Information and Communication Technologies (AICT). IEEE, 2017. http://dx.doi.org/10.1109/aiact.2017.8020083.
Pełny tekst źródłaRodes, Benjamin D., John C. Knight i Kimberly S. Wasson. "A security metric based on security arguments". W the 5th International Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2593868.2593880.
Pełny tekst źródłaMcIntosh, John C., i Candace E. Clary. "Bistatic SAR imaging geometry performance metric". W Defense and Security, redaktorzy Edmund G. Zelnio i Frederick D. Garber. SPIE, 2004. http://dx.doi.org/10.1117/12.542114.
Pełny tekst źródłaTupper, Melanie, i A. Nur Zincir-Heywood. "VEA-bility Security Metric: A Network Security Analysis Tool". W 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.138.
Pełny tekst źródłaHashemi, Seyed Mahmood, i Jingsha He. "An evolutionary approach for security metric". W 2015 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2015. http://dx.doi.org/10.1109/ictc.2015.7354776.
Pełny tekst źródłaChandra, S., i R. A. Khan. "Software security metric identification framework (SSM)". W the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523250.
Pełny tekst źródłaŠišejković, Dominik, Rainer Leupers, Gerd Ascheid i Simon Metzner. "A Unifying logic encryption security metric". W SAMOS XVIII: Architectures, Modeling, and Simulation. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3229631.3229636.
Pełny tekst źródłaKarabey, Bugra, i Nazife Baykal. "Information security metric integrating enterprise objectives". W 2009 International Carnahan Conference on Security Technology (ICCST). IEEE, 2009. http://dx.doi.org/10.1109/ccst.2009.5335549.
Pełny tekst źródłaNeto, Afonso Araujo, i Marco Vieira. "Untrustworthiness: A trust-based security metric". W 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/crisis.2009.5411967.
Pełny tekst źródłaRaporty organizacyjne na temat "Metric Security"
Jansen, Wayne. Directions in security metrics research. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7564.
Pełny tekst źródłaSwanson, M., N. Bartol, J. Sabato, J. Hash i L. Graffo. Security metrics guide for information technology systems. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.sp.800-55.
Pełny tekst źródłaLippmann, R. P., J. F. Riordan, T. H. Yu i K. K. Watson. Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics. Fort Belvoir, VA: Defense Technical Information Center, maj 2012. http://dx.doi.org/10.21236/ada565825.
Pełny tekst źródłaMonev, Veselin. Enterprise IT security metrics: Classification, examples and characteristics. Institute of Information and Communication Technologies, marzec 2014. http://dx.doi.org/10.11610/it4sec.0111.
Pełny tekst źródłaWayne F. Boyer i Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), maj 2008. http://dx.doi.org/10.2172/935471.
Pełny tekst źródłaBlack, Paul E., Michael Kass i Elizabeth Fong. Proceedings of workshop on software security assurance tools, techniques, and metrics. Gaithersburg, MD: National Institute of Standards and Technology, 2006. http://dx.doi.org/10.6028/nist.sp.500-265.
Pełny tekst źródłaHoaglund, Robert, i Walter Gazda. Assessment of Performance Measures for Security of the Maritime Transportation Network. Port Security Metrics: Proposed Measurement of Deterrence Capability. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2007. http://dx.doi.org/10.21236/ada471403.
Pełny tekst źródłaWilliams, Laurie. On the Use of Software Metrics as a Predictor of Software Security Problems. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2013. http://dx.doi.org/10.21236/ada581470.
Pełny tekst źródłaBlack, Paul E., i Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, listopad 2016. http://dx.doi.org/10.6028/nist.sp.500-320.
Pełny tekst źródłaPerdigão, Rui A. P. Information physics and quantum space technologies for natural hazard sensing, modelling and prediction. Meteoceanics, wrzesień 2021. http://dx.doi.org/10.46337/210930.
Pełny tekst źródła