Results 1 to 10 of about 158,430 (308)

Model-Based Security Testing [PDF]

open access: diamondElectronic Proceedings in Theoretical Computer Science, 2012
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many
Ina Schieferdecker   +2 more
doaj   +3 more sources

Security Testing [PDF]

open access: bronze, 2016
Faisal Anwer   +2 more
  +5 more sources

ANALYSIS AND COMPARATIVE STUDIES OF SOFTWARE PENETRATION TESTING METHODS

open access: yesСучасні інформаційні системи, 2021
Information security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of the reputation and image of the company, which ultimately, in some cases ...
Джан Ліцзян   +4 more
doaj   +1 more source

Enterprise environment modeling for penetration testing on the OpenStack virtualization platform

open access: yesJournal of Global Business Insights, 2021
The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal ...
Vincent Karovic   +3 more
doaj   +1 more source

Rapid Determination of Bucinnazine in Blood by UPLC-MS/MS [PDF]

open access: yesFayixue Zazhi, 2023
Objective To establish a rapid method for the analysis of bucinnazine in blood by UPLC-MS/MS and to apply the method to the practical case. Methods After the internal standard was added to blood, the protein was precipitated with 900 μL mixed solution ...
Zhang-ming GAO, Jing-yu SHI, Hao ZENG, Xue-jun ZHANG
doaj   +1 more source

Access security testing for wireless power terminals based on DNN

open access: yesZhejiang dianli, 2023
The external wireless terminals of the new power system are susceptible to be attacked through internal network penetration triggered by physical contact. The traditional device security test has little effect on improving the security performance of the
LYU Bang   +5 more
doaj   +1 more source

THE SOFTWARE SECURITY DECISION SUPPORT METHOD DEVELOPMENT

open access: yesСучасні інформаційні системи, 2022
The actuality of the power to improve the accuracy of the results was determined in order to make a decision about the process of testing the software security. An analysis of the methods of support for making a decision was carried out.
Zhang Liqiang, Nataliia Miroshnichenko
doaj   +1 more source

Research on Internet Financial Information Security Evaluation Index System [PDF]

open access: yesJisuanji gongcheng, 2017
Aiming at the imformation security assessment problem of security protection system of Internet Finance,based on the specific requirements of 《Internet Financial Networks and Information Security Technical Guidance》and the elements of P2DR2 security ...
LIANG Man,XU Yu,LI Hongda,CHEN Qingming
doaj   +1 more source

Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models

open access: yesSensors, 2023
Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside.
Anne Borcherding   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy