Results 1 to 10 of about 158,430 (308)
Model-Based Security Testing [PDF]
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many
Ina Schieferdecker +2 more
doaj +3 more sources
Crowdsourcing Framework for Security Testing and Verification of Industrial Cyber-Physical Systems. [PDF]
Li Z, Ding Y, Zhao R, Wang S, Li J.
europepmc +3 more sources
ANALYSIS AND COMPARATIVE STUDIES OF SOFTWARE PENETRATION TESTING METHODS
Information security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of the reputation and image of the company, which ultimately, in some cases ...
Джан Ліцзян +4 more
doaj +1 more source
Enterprise environment modeling for penetration testing on the OpenStack virtualization platform
The article presents the design of a model environment for penetration testing of an organization using virtualization. The need for this model was based on the constantly increasing requirements for the security of information systems, both in legal ...
Vincent Karovic +3 more
doaj +1 more source
Rapid Determination of Bucinnazine in Blood by UPLC-MS/MS [PDF]
Objective To establish a rapid method for the analysis of bucinnazine in blood by UPLC-MS/MS and to apply the method to the practical case. Methods After the internal standard was added to blood, the protein was precipitated with 900 μL mixed solution ...
Zhang-ming GAO, Jing-yu SHI, Hao ZENG, Xue-jun ZHANG
doaj +1 more source
Access security testing for wireless power terminals based on DNN
The external wireless terminals of the new power system are susceptible to be attacked through internal network penetration triggered by physical contact. The traditional device security test has little effect on improving the security performance of the
LYU Bang +5 more
doaj +1 more source
THE SOFTWARE SECURITY DECISION SUPPORT METHOD DEVELOPMENT
The actuality of the power to improve the accuracy of the results was determined in order to make a decision about the process of testing the software security. An analysis of the methods of support for making a decision was carried out.
Zhang Liqiang, Nataliia Miroshnichenko
doaj +1 more source
Research on Internet Financial Information Security Evaluation Index System [PDF]
Aiming at the imformation security assessment problem of security protection system of Internet Finance,based on the specific requirements of 《Internet Financial Networks and Information Security Technical Guidance》and the elements of P2DR2 security ...
LIANG Man,XU Yu,LI Hongda,CHEN Qingming
doaj +1 more source
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside.
Anne Borcherding +2 more
doaj +1 more source

