Results 1 to 10 of about 1,298,604 (237)
Model-Based Security Testing [PDF]
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many
Ina Schieferdecker +2 more
doaj +8 more sources
Security Testing: A Survey [PDF]
Identifying vulnerabilities and ensuring security functionality by security testing is a widely applied measure to evaluate and improve the security of software.
Abdelnur +133 more
core +4 more sources
Combinatorial Methods in Security Testing. [PDF]
Combinatorial methods can make software security testing much more efficient and effective than conventional approaches.
Simos DE +3 more
europepmc +4 more sources
Security Attack Testing (SAT)—testing the security of information systems at design time [PDF]
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number of languages, methods, methodologies and techniques for considering security issues during the developmental stages of an information system. However, these approaches mainly
Mouratidis, Haralambos, Giorgini, Paolo
openaire +4 more sources
Intelligent penetration testing method for power internet of things systems combining ontology knowledge and reinforcement learning. [PDF]
With the application of new-generation information technologies such as big data, artificial intelligence, and the energy Internet in Power Internet of Things (IoT) systems, a large number of IoT terminals, acquisition terminals, and transmission devices
Shoudao Sun +3 more
doaj +2 more sources
ANALYSIS AND COMPARATIVE STUDIES OF SOFTWARE PENETRATION TESTING METHODS
Information security is one of the most important components in any organization. The disclosure of this information can lead not only to material losses, but also to the loss of the reputation and image of the company, which ultimately, in some cases ...
Джан Ліцзян +4 more
doaj +1 more source
THE SOFTWARE SECURITY DECISION SUPPORT METHOD DEVELOPMENT
The actuality of the power to improve the accuracy of the results was determined in order to make a decision about the process of testing the software security. An analysis of the methods of support for making a decision was carried out.
Zhang Liqiang, Nataliia Miroshnichenko
doaj +1 more source
Rapid Determination of Bucinnazine in Blood by UPLC-MS/MS [PDF]
Objective To establish a rapid method for the analysis of bucinnazine in blood by UPLC-MS/MS and to apply the method to the practical case. Methods After the internal standard was added to blood, the protein was precipitated with 900 μL mixed solution ...
Zhang-ming GAO, Jing-yu SHI, Hao ZENG, Xue-jun ZHANG
doaj +1 more source
The principal goal of Group Testing (GT) is to identify a small subset of "defective" items from a large population, by grouping items into as few test pools as possible. The test outcome of a pool is positive if it contains at least one defective item, and is negative otherwise.
Alejandro Cohen +2 more
openaire +3 more sources
Access security testing for wireless power terminals based on DNN
The external wireless terminals of the new power system are susceptible to be attacked through internal network penetration triggered by physical contact. The traditional device security test has little effect on improving the security performance of the
LYU Bang +5 more
doaj +1 more source

