Artykuły w czasopismach na temat „Metric Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Metric Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Neto, Afonso Araújo, i Marco Vieira. "Benchmarking Untrustworthiness". International Journal of Dependable and Trustworthy Information Systems 1, nr 2 (kwiecień 2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Pełny tekst źródłaShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan i Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability". Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Pełny tekst źródłaDíaz, Álvaro, Javier González-Bayon i Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator". Journal of Circuits, Systems and Computers 25, nr 07 (22.04.2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Pełny tekst źródłaYee, George O. M. "Designing Sound Security Metrics". International Journal of Systems and Software Security and Protection 10, nr 1 (styczeń 2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Pełny tekst źródłaShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu i Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security". Security and Communication Networks 2021 (24.08.2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Pełny tekst źródłaTjirare, D., i F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia". Namibian Journal for Research, Science and Technology 1, nr 1 (16.10.2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Pełny tekst źródłaJouini, Mouna, i Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems". International Journal of Organizational and Collective Intelligence 4, nr 3 (lipiec 2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Pełny tekst źródłaLe, Ngoc Thuy, i Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security". Journal of Telecommunications and the Digital Economy 7, nr 1 (30.03.2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Pełny tekst źródłaKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi i Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products". Indian Journal of Science and Technology 8, S8 (1.04.2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Pełny tekst źródłaIto, Kosuke, Shuji Morisaki i Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines". IoT 2, nr 4 (15.12.2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Pełny tekst źródłaAli, Shahbaz, Muhammad Khalid Mahmood, Fairouz Tchier i F. M. O. Tawfiq. "Classification of Upper Bound Sequences of Local Fractional Metric Dimension of Rotationally Symmetric Hexagonal Planar Networks". Journal of Mathematics 2021 (27.02.2021): 1–24. http://dx.doi.org/10.1155/2021/6613033.
Pełny tekst źródłaDelli Priscoli, Francesco, Vincenzo Suraci, Roberto Germanà, Alessandro Giuseppi, Andrea Tortorelli i Andrea Fiaschetti. "A security metric for assessing the security level of critical infrastructures". International Journal of Critical Computer-Based Systems 10, nr 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.10030622.
Pełny tekst źródłaTortorelli, Andrea, Andrea Fiaschetti, Alessandro Giuseppi, Vincenzo Suraci, Roberto Germanà i Francesco Delli Priscoli. "A security metric for assessing the security level of critical infrastructures". International Journal of Critical Computer-Based Systems 10, nr 1 (2020): 74. http://dx.doi.org/10.1504/ijccbs.2020.108685.
Pełny tekst źródłaKhan, Naveed, Jianbiao Zhang i Saeed Ullah Jan. "A Robust and Privacy-Preserving Anonymous User Authentication Scheme for Public Cloud Server". Security and Communication Networks 2022 (14.03.2022): 1–14. http://dx.doi.org/10.1155/2022/1943426.
Pełny tekst źródłaShi, Fan, Shaofeng Kai, Jinghua Zheng i Yao Zhong. "XLNet-Based Prediction Model for CVSS Metric Values". Applied Sciences 12, nr 18 (7.09.2022): 8983. http://dx.doi.org/10.3390/app12188983.
Pełny tekst źródłaAdamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek i Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments". Foundations of Computing and Decision Sciences 42, nr 4 (20.12.2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.
Pełny tekst źródłaWang, Zibo, Yaofang Zhang, Zhiyao Liu, Tongtong Li, Yilu Chen, Chen Yang, Bailing Wang i Zhusong Liu. "A Prioritizing Interdiction Surface-Based Vulnerability Remediation Composite Metric for Industrial Control Systems". Wireless Communications and Mobile Computing 2022 (29.05.2022): 1–16. http://dx.doi.org/10.1155/2022/6442778.
Pełny tekst źródłaFarid, Farnaz, Seyed Shahrestani i Chun Ruan. "A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems". International Journal of Interactive Communication Systems and Technologies 9, nr 1 (styczeń 2019): 48–76. http://dx.doi.org/10.4018/ijicst.2019010104.
Pełny tekst źródłaHu, Hao, Yuling Liu, Hongqi Zhang i Yuchen Zhang. "Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis". Security and Communication Networks 2018 (2.08.2018): 1–14. http://dx.doi.org/10.1155/2018/5787102.
Pełny tekst źródłaNovikova, Evgenia, Elena Doynikova, Diana Gaifulina i Igor Kotenko. "Construction and Analysis of Integral User-Oriented Trustworthiness Metrics". Electronics 11, nr 2 (12.01.2022): 234. http://dx.doi.org/10.3390/electronics11020234.
Pełny tekst źródłaDin, Roshidi, Rosmadi Bakar, Azizan Ismail, Aida Mustapha i Sunariya Utama. "Evaluation review of effectiveness and security metrics performance on information technology domain". Indonesian Journal of Electrical Engineering and Computer Science 16, nr 2 (1.11.2019): 1059. http://dx.doi.org/10.11591/ijeecs.v16.i2.pp1059-1064.
Pełny tekst źródłaChubaievskyi, Vitaliy, Valery Lakhno, Olena Kryvoruchko, Dmytro Kasatkin, Alona Desiatko, Andrii Blozva i Boris Gusev. "EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS". Cybersecurity: Education, Science, Technique 1, nr 13 (2021): 16–28. http://dx.doi.org/10.28925/2663-4023.2021.13.1628.
Pełny tekst źródłaZhang, Jing, Han-ying Hu, Min Tong i Qing-rong Li. "A Security Metric and Related Security Routing Algorithm Design Based on Trust Model". Journal of Electronics & Information Technology 30, nr 1 (17.02.2011): 10–15. http://dx.doi.org/10.3724/sp.j.1146.2007.00726.
Pełny tekst źródłaJekl, Jan, i Jiří Jánský. "Security Challenges and Economic-Geographical Metrics for Analyzing Safety to Achieve Sustainable Protection". Sustainability 14, nr 22 (16.11.2022): 15161. http://dx.doi.org/10.3390/su142215161.
Pełny tekst źródłaSharma Gaur, Madhu, i Bhaskar Pant. "Trust Metric based Soft Security in Mobile Pervasive Environment". International Journal of Computer Network and Information Security 6, nr 10 (8.09.2014): 64–71. http://dx.doi.org/10.5815/ijcnis.2014.10.08.
Pełny tekst źródłaAgrawal, A. "Software Security Metric Development Framework (An Early Stage Approach)". American Journal of Software Engineering and Applications 2, nr 6 (2013): 150. http://dx.doi.org/10.11648/j.ajsea.20130206.14.
Pełny tekst źródłaMukherjee, Preetam, i Chandan Mazumdar. "“Security Concern” as a Metric for Enterprise Business Processes". IEEE Systems Journal 13, nr 4 (grudzień 2019): 4015–26. http://dx.doi.org/10.1109/jsyst.2019.2918116.
Pełny tekst źródłaZonouz, Saman A., Robin Berthier, Himanshu Khurana, William H. Sanders i Tim Yardley. "Seclius: An Information Flow-Based, Consequence-Centric Security Metric". IEEE Transactions on Parallel and Distributed Systems 26, nr 2 (luty 2015): 562–73. http://dx.doi.org/10.1109/tpds.2013.162.
Pełny tekst źródłaAlmasizadeh, Jaafar, i Mohammad Abdollahi Azgomi. "Mean privacy: A metric for security of computer systems". Computer Communications 52 (październik 2014): 47–59. http://dx.doi.org/10.1016/j.comcom.2014.06.009.
Pełny tekst źródłaPurohit, Neha, Shubhalaxmi Joshi, Milind Pande i Susan Lincke. "Pragmatic analysis of ECC based security models from an empirical perspective". Journal of Discrete Mathematical Sciences & Cryptography 26, nr 3 (2023): 739–58. http://dx.doi.org/10.47974/jdmsc-1749.
Pełny tekst źródłaRakovskiy, Dmitriy I. "Influence of multi&label class problem of system logs on the security of computer networks". H&ES Research 15, nr 1 (2023): 48–56. http://dx.doi.org/10.36724/2409-5419-2023-15-1-48-56.
Pełny tekst źródłaCasola, Valentina, Antonino Mazzeo, Nicola Mazzocca i Valeria Vittorini. "A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures". Journal of Computer Security 15, nr 2 (5.02.2007): 197–229. http://dx.doi.org/10.3233/jcs-2007-15201.
Pełny tekst źródłaDobrowolski, Zbysław, i Grzegorz Drozdowski. "Does the Net Present Value as a Financial Metric Fit Investment in Green Energy Security?" Energies 15, nr 1 (4.01.2022): 353. http://dx.doi.org/10.3390/en15010353.
Pełny tekst źródłaChen, Hongsong, Haiyan Zhuang, Zhiguang Shan, Chao-Hsien Lee i Zhongchuan Fu. "A novel SMP-based survivability evaluation metric and approach in wireless sensor network". Computer Science and Information Systems 16, nr 3 (2019): 733–51. http://dx.doi.org/10.2298/csis180918024c.
Pełny tekst źródłaYevseiev, Serhii, Oleksandr Milov, Ivan Opirskyy, Olha Dunaievska, Oleksandr Huk, Volodymyr Pogorelov, Kyrylo Bondarenko, Nataliia Zviertseva, Yevgen Melenti i Bogdan Tomashevsky. "Development of a concept for cybersecurity metrics classification". Eastern-European Journal of Enterprise Technologies 4, nr 4 (118) (31.08.2022): 6–18. http://dx.doi.org/10.15587/1729-4061.2022.263416.
Pełny tekst źródłaShen, Danyao, Fengchao Zhu, Zhanpeng Zhang i Xiaodong Mu. "Radio Frequency Fingerprint Identification Based on Metric Learning". International Journal of Information Technologies and Systems Approach 16, nr 3 (13.04.2023): 1–13. http://dx.doi.org/10.4018/ijitsa.321194.
Pełny tekst źródłaPark, Ui Hyun, Jeong-hyeop Hong, Auk Kim i Kyung Ho Son. "Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust". Electronics 12, nr 8 (18.04.2023): 1906. http://dx.doi.org/10.3390/electronics12081906.
Pełny tekst źródłaRehman, Eid, Muhammad Sher, Syed Hussnain Abbas Naqvi, Khan Badar Khan i Kamran Ullah. "Energy Efficient Secure Trust Based Clustering Algorithm for Mobile Wireless Sensor Network". Journal of Computer Networks and Communications 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/1630673.
Pełny tekst źródłaLau, Terry Shue Chien, i Chik How Tan. "On the design and security of Lee metric McEliece cryptosystems". Designs, Codes and Cryptography 90, nr 3 (18.01.2022): 695–717. http://dx.doi.org/10.1007/s10623-021-01002-2.
Pełny tekst źródłaRajaSekhar, K., L. S. S. Reddy i U. J. Kameswari. "Secure System of Attack Patterns towards Application Security Metric Derivation". International Journal of Computer Applications 53, nr 1 (25.09.2012): 11–18. http://dx.doi.org/10.5120/8384-1987.
Pełny tekst źródłaSchwartau, Winn. "Network Security It’s About Time: An Offer for a Metric". Network Security 2001, nr 8 (sierpień 2001): 11–13. http://dx.doi.org/10.1016/s1353-4858(01)00815-7.
Pełny tekst źródłaSimpson, Joseph J., Ann Miller i Cihan H. Dagli. "6.3.1 Secure Adaptive Response Potential (SARP): A System Security Metric". INCOSE International Symposium 18, nr 1 (czerwiec 2008): 706–19. http://dx.doi.org/10.1002/j.2334-5837.2008.tb00838.x.
Pełny tekst źródłaGhobrial, Atef, i Theodore H. Poister. "Evaluating security of rail transit systems: A metric system approach". Journal of Advanced Transportation 29, nr 2 (marzec 1995): 251–62. http://dx.doi.org/10.1002/atr.5670290208.
Pełny tekst źródłaKhan, Salman A., Kashif Iqbal, Nazeeruddin Mohammad, Rehan Akbar, Syed Saad Azhar Ali i Ammar Ahmed Siddiqui. "A Novel Fuzzy-Logic-Based Multi-Criteria Metric for Performance Evaluation of Spam Email Detection Algorithms". Applied Sciences 12, nr 14 (12.07.2022): 7043. http://dx.doi.org/10.3390/app12147043.
Pełny tekst źródłaYeremenko, Oleksandra, Mykhailo Persikov, Valentyn Lemeshko i Bassam Altaki. "Research and Development of the Secure Routing Flow-Based Model with Load Balancing". Problemi telekomunìkacìj, nr 2(29) (22.12.2021): 3–14. http://dx.doi.org/10.30837/pt.2021.2.01.
Pełny tekst źródłaTkaczyk, Zoé, i William G. Moseley. "Dietary Power and Self-Determination among Female Farmers in Burkina Faso: A Proposal for a Food Consumption Agency Metric". Land 12, nr 5 (28.04.2023): 978. http://dx.doi.org/10.3390/land12050978.
Pełny tekst źródłaYin, Lihua, Yanwei Sun, Zhen Wang, Yunchuan Guo, Fenghua Li i Binxing Fang. "Security Measurement for Unknown Threats Based on Attack Preferences". Security and Communication Networks 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/7412627.
Pełny tekst źródłaSegura Smith, Andrea, Julie Porter, Amogh Badwe, Eileen F. Kiamanesh i Douglas W. Blayney. "Quality, clinician and information technology (IT) partnership for metric reporting." Journal of Clinical Oncology 35, nr 8_suppl (10.03.2017): 128. http://dx.doi.org/10.1200/jco.2017.35.8_suppl.128.
Pełny tekst źródłaTashtoush, Yahya M., Aisha Zaidan i Izzat M. Alsmadi. "Implications for Website Trust and Credibility Assessment". International Journal of E-Entrepreneurship and Innovation 3, nr 4 (październik 2012): 17–33. http://dx.doi.org/10.4018/jeei.2012100102.
Pełny tekst źródłaRamanauskaitė, Simona, Neringa Urbonaitė, Šarūnas Grigaliūnas, Saulius Preidys, Vaidotas Trinkūnas i Algimantas Venčkauskas. "Educational Organization’s Security Level Estimation Model". Applied Sciences 11, nr 17 (31.08.2021): 8061. http://dx.doi.org/10.3390/app11178061.
Pełny tekst źródła