Results 251 to 260 of about 92,483 (291)
Some of the next articles are maybe not open access.

Aspect-oriented modeling framework for security hardening

Innovations in Systems and Software Engineering, 2015
Aspect-oriented modeling (AOM) emerged as a promising paradigm for handling crosscutting concerns, such as security, at the software modeling level. Most existing AOM contributions are presented from a practical perspective and lack formal syntax and semantics.
Djedjiga Mouheb   +5 more
openaire   +1 more source

Generalized distortional hardening in a thermomechanically coupled framework

PAMM, 2014
AbstractIn many metals like aluminum the evolution of the microstructure leads to an evolution of the macroscopic yield surface. Clearly, isotropic and kinematic hardening models cannot capture this effect realistically. For that purpose, a new generalized distortional hardening model is proposed.
Alexander Bartels, Jörn Mosler
openaire   +1 more source

A security policy hardening framework for Socio-Cyber-Physical Systems

Journal of Systems Architecture, 2021
Abstract Modern systems are heterogeneous inter-operating subsystems of different aspects that can be physical, technical, cybernetics, and even social like agent operators in smart grids or smart transportations. With the social dimension, we name these systems by Socio-Cyber-Physical Systems ( SCPS ).
openaire   +1 more source

Radiation hardened by design asynchronous framework

2022
The complex interrelationships between technology, design, and fabrication require that radiation-hardness must be considered when circuits will be used in low-orbit or deep-space environments. Unlike traditional synchronous circuits, asynchronous circuits do not use a global clock signal to control the update of the state registers and have potential ...
openaire   +1 more source

MODELING OF THE COOL CREEPIN THE FRAMEWORK OF THE HARDENING THEORIES ON THE STEPWISE LOADING

The Second All-Russian Scientific Conference, 2021
In the framework of the hardening hypothesis, the creep behavior of a titanium alloy at room temperature is modeled at stepwise stress change both increasing and decreasing load. Methods for the identification of material constants and functions included in constitutive equations of the hardening theories are considered in detail. The prospects for the
S. P. Pomytkin, K. А. Gukasjan
openaire   +1 more source

NINJA: a noninvasive framework for internal computer security hardening

SPIE Proceedings, 2004
Vulnerabilities are a growing problem in both the commercial and government sector. The latest vulnerability information compiled by CERT/CC, for the year ending Dec. 31, 2002 reported 4129 vulnerabilities representing a 100% increase over the 2001 [1] (the 2003 report has not been published at the time of this writing).
Thomas G. Allen, Steve Thomson
openaire   +1 more source

Differential Hardening in Sheet Metal Under Biaxial Loading: A Theoretical Framework

Journal of Applied Mechanics, 1992
A simple constitutive framework is proposed to take account of progressive changes in a stress-based criterion of yielding as plastic deformation accumulates. The analysis is relevant to a sheet of isotropic or orthotropic material which is subsequently loaded in its plane by biaxial tensions (σ1, σ2) in arbitrary fixed ratio. Under these circumstances
Hill, R., Hutchinson, J. W.
openaire   +1 more source

A High-level Aspect-oriented-based Framework for Software Security Hardening

Information Security Journal: A Global Perspective, 2008
In this paper, we present an aspect-oriented approach and propose a high-level language called SHL (Security Hardening Language) for the systematic security hardening of software. The primary contribution of this proposition is providing the software architects with the capabilities to perform security hardening by applying well-defined solutions and ...
Azzam Mourad   +2 more
openaire   +2 more sources

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices

2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), 2018
ARM devices (mobile phone, IoT devices) are getting more popular in our daily life due to the low power consumption and cost. These devices carry a huge number of user's private information, which attracts attackers' attention and increase the security risk.
ZHANG, Zhangkai   +4 more
openaire   +2 more sources

The Framework for Hardening the Budget Constraint and Corporate Governance

1998
The genesis of the bad debt problem in transition economies, its causes and some of its consequences, both for banks and for enterprises, were extensively described with regard to all transition economies in Chapter 2. At this stage, continuing with a focus on Poland as the largest and most important early transition economy, the groundwork needs to be
openaire   +1 more source

Home - About - Disclaimer - Privacy