Добірка наукової літератури з теми "Security systems Mathematics"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security systems Mathematics".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security systems Mathematics"
Hwang, Suk Geun. "Matrix polytope and speech security systems." Korean Journal of Computational & Applied Mathematics 2, no. 2 (September 1995): 3–12. http://dx.doi.org/10.1007/bf03008959.
Повний текст джерелаShevchenko, Svitlana, Yuliia Zhdanovа, Pavlo Skladannyi, and Svitlana Spasiteleva. "MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY." Cybersecurity: Education, Science, Technique 1, no. 13 (2021): 133–44. http://dx.doi.org/10.28925/2663-4023.2021.13.133144.
Повний текст джерелаBokova, Oksana, Irina Drovnikova, Andrei Etepnev, Evgeniy Rogozin, and Victor Khvostov. "Methods of Estimating Reliability of Information Security Systems which Protect from Unauthorized Access in Automated Systems." SPIIRAS Proceedings 18, no. 6 (November 29, 2019): 1301–32. http://dx.doi.org/10.15622/sp.2019.18.6.1301-1332.
Повний текст джерелаStyugin, Mikhail A., and Alexey A. Kytmanov. "Mathematical Modeling of User Perception in Information Security Systems." Journal of Siberian Federal University. Mathematics & Physics 8, no. 4 (December 2015): 454–66. http://dx.doi.org/10.17516/1997-1397-2015-8-4-454-466.
Повний текст джерелаAra, Anees. "Privacy Preservation in Cloud Based Cyber Physical Systems." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4320–27. http://dx.doi.org/10.1166/jctn.2019.8520.
Повний текст джерелаBin-Faisal, Sajid, Dip Nandi, and Mashiour Rahman. "Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 17–30. http://dx.doi.org/10.5815/ijitcs.2022.02.02.
Повний текст джерелаAdebayo, Olawale Surajudeen, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, and Lateefah Abdulazeez. "Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System." International Journal of Information Technology and Computer Science 14, no. 2 (April 8, 2022): 31–44. http://dx.doi.org/10.5815/ijitcs.2022.02.03.
Повний текст джерелаGadsby, D., P. Twigg, N. Bowring, and I. Williams. "Ultra Wideband Positioning for Intelligent Security Systems." Measurement and Control 39, no. 4 (May 2006): 108–13. http://dx.doi.org/10.1177/002029400603900401.
Повний текст джерелаStefantsov, D. A. "Implementation of security policies in programming informationprocessing systems." Prikladnaya diskretnaya matematika, no. 13 (September 1, 2011): 55–64. http://dx.doi.org/10.17223/20710410/13/4.
Повний текст джерелаMamatkazin, Ilya R. "SYSTEMS OF LAW AND FUNCTIONAL EQUIVALENTS IN SOCIAL SECURITY LAW." Proceedings of the Institute of State and Law of the RAS 17, no. 2 (April 29, 2022): 75–98. http://dx.doi.org/10.35427/2073-4522-2022-17-2-mamatkazin.
Повний текст джерелаДисертації з теми "Security systems Mathematics"
Singh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.
Повний текст джерелаBig data har använts regelbundet inom ekonomi för att bygga prognosmodeller, det är dock ett relativt nytt koncept inom säkerhetsbranschen. Denna studie förutsäger vilka larmkoder som kommer att låta under de kommande 7 dagarna på plats $L$ genom att observera de senaste 7 dagarna. Logistisk regression och neurala nätverk används för att lösa detta problem. Eftersom att problemet är av en multi-label natur tillämpas logistisk regression i kombination med binary relevance och classifier chains. Modellerna tränas på data som har annoterats med två separata metoder. Den första metoden annoterar datan genom att endast observera plats $L$ och den andra metoden betraktar $L$ och $L$:s omgivning. Eftersom problemet är multi-labeled kommer annoteringen sannolikt att vara obalanserad och därför används resamplings metoden, SMOTE, och random over-sampling för att öka frekvensen av minority labels. Recall, precision och F1-score mättes för att utvärdera modellerna. Resultaten visar att den andra annoterings metoden presterade bättre för alla modeller och att classifier chains och binary relevance presterade likartat. Binary relevance och classifier chains modellerna som tränades på datan som använts sig av resamplings metoden SMOTE gav ett högre macro average F1-score, dock sjönk prestationen för neurala nätverk. Resamplings metoden SMOTE presterade även bättre än random over-sampling. Neurala nätverksmodellen överträffade de andra två modellerna på alla metoder och uppnådde högsta F1-score.
Bengtsson, Mattias. "Mathematical foundation needed for development of IT security metrics." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9766.
Повний текст джерелаIT security metrics are used to achieve an IT security assessment of certain parts of the IT security environment. There is neither a consensus of the definition of an IT security metric nor a natural scale type of the IT security. This makes the interpretation of the IT security difficult. To accomplish a comprehensive IT security assessment one must aggregate the IT security values to compounded values.
When developing IT security metrics it is important that permissible mathematical operations are made so that the information are maintained all the way through the metric. There is a need for a sound mathematical foundation for this matter.
The main results produced by the efforts in this thesis are:
• Identification of activities needed for IT security assessment when using IT security metrics.
• A method for selecting a set of security metrics in respect to goals and criteria, which also is used to
• Aggregate security values generated from a set of security metrics to compounded higher level security values.
• A mathematical foundation needed for development of security metrics.
Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.
Повний текст джерелаLi, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Повний текст джерелаAgarwal, Akash. "A Study of Communication Link Removal in Static and Dynamic Teams." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1510680159436136.
Повний текст джерелаTerashima, Robert Seth. "Tweakable Ciphers: Constructions and Applications." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2484.
Повний текст джерелаGoeschel, Kathleen. "Feature Set Selection for Improved Classification of Static Analysis Alerts." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1091.
Повний текст джерелаFung, Charles Way Hun. "Multi-marcação de vídeo baseada em marca d'água LWT-SVD usando abordagem lateral." Universidade Tecnológica Federal do Paraná, 2012. http://repositorio.utfpr.edu.br/jspui/handle/1/328.
Повний текст джерелаVídeos digitais se tornaram uma forma de comunicação altamente utilizada na rede, entretanto estes dados são facilmente copiados e distribuídos. Isto se deve ao crescente número de ferramentas que surgiram com este objetivo, causando quebra dos direitos autorais e distribuição ilegal de conteúdo. A solução mais estudada para este problema são as marcas d'água digitais, que provêm segurança em forma de autenticação e verificação de violação. Neste trabalho, foi desenvolvido um novo método de inserção e extração de marcas d'água em um vídeo, usando o processo chamado abordagem lateral. Este possibilita a marcação em blocos de frames. As diversas marcas inseridas são usadas como redundância para aumentar a robustez contra ataques. Os testes realizados seguiram o padrão dos benchmarks Vidmark e Stirmark, os quais demonstram a eficiência do método em manter a marca d'água mesmo após ataques.
Digital videos have become the most used way to communicate, however these data are easily copied and distributed. That happen due the growing number of tools that are create with this goal, causing breach of copyright and illegal distribution of content. The most studied solution that can solve this problem are the digital watermarks that provide security like authentication and tamper detection. In this work, we developed a new method of embedding and extracting watermarks in a video using a process called side view. This process allows watermark a block of frames. The several watermarks embedded can be used like redundance to grow the robustness of the method against attacks. The tests followed the standard benchmarks Vidmark and Stirmark that show the performance of the method in keep the watermark even after attacks.
Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Повний текст джерелаSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Повний текст джерелаКниги з теми "Security systems Mathematics"
Anderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Знайти повний текст джерелаSecurity engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Знайти повний текст джерелаAnderson, Ross. Security engineering: A guide to building dependable distributed systems. 2nd ed. Indianapolis, IN: Wiley Technology Pub., 2008.
Знайти повний текст джерелаSecurity engineering: A guide to building dependable distributed systems. New York: Wiley, 2001.
Знайти повний текст джерела1955-, Kachyns'kyi A. B., ред. Systemno-kont︠s︡eptualʹni zasady stratehiï nat︠s︡ionalʹnoï bezpeky Ukraïny. Kyïv: I︠E︡vroatlantykinform, 2007.
Знайти повний текст джерелаInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Знайти повний текст джерелаInternational Workshop on Computational Intelligence in Security for Information Systems (2008 Genoa, Italy). Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS 2008. Berlin: Springer, 2009.
Знайти повний текст джерела1972-, Ito Takayuki, ed. Rational, robust, and secure negotiations in multi-agent systems. Berlin: Springer, 2008.
Знайти повний текст джерелаPaolo, Gastaldo, Zunino Rodolfo, Corchado Emilio, and SpringerLink (Online service), eds. Computational Intelligence in Security for Information Systems: CISIS’09, 2nd International Workshop Burgos, Spain, September 2009 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009.
Знайти повний текст джерелаPierre, Plamondon, International Labour Office, and International Social Security Association, eds. Actuarial practice in social security. Geneva: International Labour Office, 2002.
Знайти повний текст джерелаЧастини книг з теми "Security systems Mathematics"
Walter, Max, and Carsten Trinitis. "Quantifying the Security of Composed Systems." In Parallel Processing and Applied Mathematics, 1026–33. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11752578_124.
Повний текст джерелаPanagopoulos, D., and S. Hassapis. "A Short Exposition of Topological Applications to Security Systems." In Applications of Mathematics and Informatics in Science and Engineering, 189–98. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04720-1_12.
Повний текст джерелаGąsior, Jakub, Franciszek Seredyński, and Andrei Tchernykh. "A Security-Driven Approach to Online Job Scheduling in IaaS Cloud Computing Systems." In Parallel Processing and Applied Mathematics, 156–65. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78054-2_15.
Повний текст джерелаEickmann, Jonas, Christian Bredtmann, and Albert Moser. "Security-Constrained Optimization Framework for Large-Scale Power Systems Including Post-contingency Remedial Actions and Inter-temporal Constraints." In Trends in Mathematics, 47–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51795-7_4.
Повний текст джерелаVert, Gregory, Ann Leslie Claesson-Vert, Jesse Roberts, and Erica Bott. "A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics." In Computer and Network Security Essentials, 41–64. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58424-9_3.
Повний текст джерелаGreen, Sam, Craig M. Vineyard, and Çetin Kaya Koç. "Mathematical Optimizations for Deep Learning." In Cyber-Physical Systems Security, 69–92. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_4.
Повний текст джерелаPrajapati, Apeksha. "Mathematical Analysis of Effectiveness of Security Patches in Securing Wireless Sensor Network." In Advances in Intelligent Systems and Computing, 143–55. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8222-2_12.
Повний текст джерелаGollmann, Dieter. "Security for Cyber-Physical Systems." In Mathematical and Engineering Methods in Computer Science, 12–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36046-6_2.
Повний текст джерелаKatal, A. "Security and Privacy in Mobile Cloud Computing." In Mathematical Modeling for Intelligent Systems, 17–33. Boca Raton: Chapman and Hall/CRC, 2022. http://dx.doi.org/10.1201/9781003291916-2.
Повний текст джерелаFranzen, Dietmar. "Incomplete Contracts and Security Design." In Lecture Notes in Economics and Mathematical Systems, 45–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/978-3-642-56932-6_3.
Повний текст джерелаТези доповідей конференцій з теми "Security systems Mathematics"
Feng Liu and Guodong Shi. "Nonlinear mathematics model and stability for social security systems." In 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE, 2010. http://dx.doi.org/10.1109/iske.2010.5680846.
Повний текст джерелаTarek, Nouioua, and Belbachir Ahmed Hafid. "The Quantum Computer and the Security of Information Systems." In 2021 International Conference on Recent Advances in Mathematics and Informatics (ICRAMI). IEEE, 2021. http://dx.doi.org/10.1109/icrami52622.2021.9585929.
Повний текст джерелаKapralyakov, Petko, George Venkov, Ralitza Kovacheva, and Vesela Pasheva. "Security of Data, Stored in Information Systems of Bulgarian Municipal Administrations." In APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE '11): Proceedings of the 37th International Conference. AIP, 2011. http://dx.doi.org/10.1063/1.3664389.
Повний текст джерелаAbdulmunem, Al-Sudani Mustafa Qahtan, and Vyacheslav S. Kharchenko. "Availability and Security Assessment of Smart Building Automation Systems: Combining of Attack Tree Analysis and Markov Models." In 2016 Third International Conference on Mathematics and Computers in Sciences and in Industry (MCSI). IEEE, 2016. http://dx.doi.org/10.1109/mcsi.2016.062.
Повний текст джерелаBijelić, Zdravko, Biljana Milanović, and Mitar Bijelić. "Model of Optimal System Management in the Military Process Industry in the Conditions of the COVID-19 Pandemic." In 34th International Congress on Process Industry. SMEITS, 2021. http://dx.doi.org/10.24094/ptk.021.34.1.67.
Повний текст джерелаGoodman, Jacob M., Jinho Kim, S. Andrew Gadsden, and Stephen A. Wilkerson. "System and mathematical modeling of quadrotor dynamics." In SPIE Defense + Security, edited by Robert E. Karlsen, Douglas W. Gage, Charles M. Shoemaker, and Grant R. Gerhart. SPIE, 2015. http://dx.doi.org/10.1117/12.2185196.
Повний текст джерелаNovikov, O. P., and M. O. Novikov. "Mathematical model of the frame security system." In Global science. Development and novelty. L-Journal, 2020. http://dx.doi.org/10.18411/gsdn-25-12-2020-07.
Повний текст джерелаЯркова, Ольга Николаевна, Анастасия Сергеевна Яркова, and Алена Владимировна Труфанова. "MATHEMATICAL MODELING OF INVESTMENT ALLOCATION STRATEGY FOR INFORMATION SECURITY SYSTEM ORGANIZATION." In Сборник избранных статей по материалам научных конференций ГНИИ “Нацразвитие” (Санкт-Петербург, Апрель 2020). Crossref, 2020. http://dx.doi.org/10.37539/apr290.2020.51.32.009.
Повний текст джерелаDuisebekova, K. S., and T. Duisebekov. "Utilization of Fuzzy Mathematics for Security Model of a System." In 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018. http://dx.doi.org/10.1109/icaict.2018.8747158.
Повний текст джерелаLi, Zhongwen, and Yang Xiang. "Mathematical Analysis of Active DDoS Defense Systems." In 2006 International Conference on Computational Intelligence and Security. IEEE, 2006. http://dx.doi.org/10.1109/iccias.2006.295324.
Повний текст джерелаЗвіти організацій з теми "Security systems Mathematics"
Perdigão, Rui A. P. Beyond Quantum Security with Emerging Pathways in Information Physics and Complexity. Synergistic Manifolds, June 2022. http://dx.doi.org/10.46337/220602.
Повний текст джерелаUnal, Beyza, Julia Cournoyer, Calum Inverarity, and Yasmin Afina. Uncertainty and complexity in nuclear decision-making. Royal Institute of International Affairs, March 2022. http://dx.doi.org/10.55317/9781784135157.
Повний текст джерелаSemerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.
Повний текст джерелаData Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.
Повний текст джерела