Results 221 to 230 of about 130,608 (266)
Some of the next articles are maybe not open access.
Network security risk level estimation tool for information security measure
2016 IEEE 7th Power India International Conference (PIICON), 2016Prevention is better than cure”, in every way we can think of, Information security is not different. We all know networks are vulnerable, but we all don't know where and how; that's why risks assessment comes in. This paper designed and implemented a unified and intelligent tool for quantitative security risk level measurement of an organization ...
Umesh Kumar Singh, Chanchala Joshi
openaire +1 more source
Security Assessment and Testing Tools Information Repository
Anais do IX Workshop de Testes e Tolerância a Falhas (WTF 2008), 2008This paper presents a repository for storing and comparing the characteristics of security assessment and testing tools. This repository supports information on the tools from different sources, ranging from specialized web sites and magazines to academic publications.
Naaliel Mendes +3 more
openaire +1 more source
Information security tools and practices: what works?
IEEE Transactions on Computers, 2004Much effort has been expended characterizing the threats and vulnerabilities associated with information security. The next step, analyzing experiences using security practices and tools, provides insight into what works and what appears to be unused or ineffective.
openaire +1 more source
Web Security Vulnerability Analysis Using Network and Information Security Tools
2012The web security vulnerabilities such as eavesdropping, impersonation, data sniffing, denial of service, and port hacking are investigated by analyzing the security weakness using the security exploration tools. Security management policies were developed based on these analyses. The results indicated that security policies produced from there analyses
Jiangbo Liu, Krishna Kant Tiwari
openaire +1 more source
RUSSIAN SOFTWARE INFORMATION SECURITY TOOLS
Informatization and communicationThe article examines various modern Russian information security tools, as well as trends in their development. The analysis of the existing means of information protection, their classification and consolidation in normative acts is carried out. The main directions of information protection are highlighted – for public needs and for the needs of ...
openaire +1 more source
Fuzzy tool for conducting information security risk analysis
Proceedings of the 2014 15th International Carpathian Control Conference (ICCC), 2014The following article proposes fuzzy tool for processing risk analysis in the area of information security. The paper reviews today's approaches (qualitative and quantitative methodologies) and together with already published results proposes a fuzzy tool to support our novel approach. In this paper the fuzzy tool itself is proposed and also every main
Jiri Bartos +3 more
openaire +1 more source
Information Lifecycle Security Risk Assessment: A tool for closing security gaps
Computers & Security, 2007News media continue to report stories of critical information loss through physical means. Most information security programs include physical protection for information system infrastructure, but not for the physical (non-electronic) forms of the information itself.
openaire +1 more source
IEEE Transactions on Software Engineering, 1997
The Compositional Security Checker (CoSeC for short) is a semantic-based tool for the automatic verification of some compositional information flow properties. The specifications given as inputs to CoSeC are terms of the Security Process Algebra, a language suited for the specification of concurrent systems where actions belong to two different levels ...
FOCARDI, Riccardo, GORRIERI R.
openaire +2 more sources
The Compositional Security Checker (CoSeC for short) is a semantic-based tool for the automatic verification of some compositional information flow properties. The specifications given as inputs to CoSeC are terms of the Security Process Algebra, a language suited for the specification of concurrent systems where actions belong to two different levels ...
FOCARDI, Riccardo, GORRIERI R.
openaire +2 more sources
Information System Information Security Hidden Danger Monitoring Tool
2023 Panda Forum on Power and Energy (PandaFPE), 2023Chenggang Yang +5 more
openaire +1 more source
Digital technology security
Currently, the role of the process of monitoring security events in information systems, including distributed information systems, is growing. Information security tools, including nodal information security tools, are the main sources of information security events for security monitoring systems.
Mikhail A. Marchenko +3 more
openaire +1 more source
Currently, the role of the process of monitoring security events in information systems, including distributed information systems, is growing. Information security tools, including nodal information security tools, are the main sources of information security events for security monitoring systems.
Mikhail A. Marchenko +3 more
openaire +1 more source

