Results 21 to 30 of about 184,016 (328)

RSA authentication mechanisms in control grid computing environment using Gridsim toolkit [PDF]

open access: yes, 2015
There are security concerns when our sensitive data is placed in the third party infrastructure such as in the Grid Computing environment. As such, it is difficult to be assured that our data is in the safe hands.Thus, authentication has become the most
Ismail, Saiful Adli   +4 more
core   +2 more sources

A Mobile Ambients-based Approach for Network Attack Modelling and Simulation [PDF]

open access: yes, 2009
Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through security perimeters and traverse a network to reach valuable assets deep inside the ...
Franqueira, Virginia Nunes Leal   +2 more
core   +5 more sources

Natural Hazards / Micro-sized enterprises: vulnerability to flash floods [PDF]

open access: yes, 2016
in dt. Sprache nicht verf\ufcgbarIn the framework of risk assessment for flash floods, vulnerability is a key concept to assess the susceptibility of elements at risk.
Fuchs, Sven   +4 more
core   +1 more source

ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing

open access: yesFuture Internet, 2019
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized.
Masky Mackita   +2 more
doaj   +1 more source

Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE [PDF]

open access: yes, 2015
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are ...
AS Sodiya   +12 more
core   +1 more source

Troubling Vulnerability: Designing with LGBT Young People's Ambivalence Towards Hate Crime Reporting [PDF]

open access: yes, 2018
HCI is increasingly working with ?vulnerable? people yet there is a danger that the label of vulnerability can alienate and stigmatize the people such work aims to support.
Briggs, J   +4 more
core   +2 more sources

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]

open access: yes, 2011
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core   +2 more sources

PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization

open access: yesApplied Sciences, 2021
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj   +1 more source

Introduction to Computer Network Vulnerabilities [PDF]

open access: yes, 2015
System vulnerabilities are weaknesses in the software or hardware on a server or a client that can be exploited by a determined intruder to gain access to or shut down a network. Vulnerabilities exist not only in the hardware and software that constitute a computer system but also in policies and procedures, especially security policies and procedures,
openaire   +2 more sources

Revisiting Employment Vulnerability Index Using Principal Component Analysis

open access: yesJPAIR, 2020
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj   +1 more source

Home - About - Disclaimer - Privacy