Results 21 to 30 of about 202,881 (332)

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +1 more source

Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model [PDF]

open access: yes, 2019
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging.
Huamin Yang   +7 more
core   +2 more sources

PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization

open access: yesApplied Sciences, 2021
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj   +1 more source

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]

open access: yes, 2011
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core   +2 more sources

Revisiting Employment Vulnerability Index Using Principal Component Analysis

open access: yesJPAIR, 2020
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj   +1 more source

Natural Hazards / Micro-sized enterprises: vulnerability to flash floods [PDF]

open access: yes, 2016
in dt. Sprache nicht verf\ufcgbarIn the framework of risk assessment for flash floods, vulnerability is a key concept to assess the susceptibility of elements at risk.
Fuchs, Sven   +4 more
core   +1 more source

A method to assess demand growth vulnerability of travel times on road network links

open access: yes, 2012
Many national governments around the world have turned their recent focus to monitoring the actual reliability of their road networks. In parallel there have been major research efforts aimed at developing modelling approaches for predicting the ...
Balijepalli   +17 more
core   +1 more source

Modeling Fault Propagation Paths in Power Systems: A New Framework Based on Event SNP Systems With Neurotransmitter Concentration [PDF]

open access: yes, 2019
To reveal fault propagation paths is one of the most critical studies for the analysis of power system security; however, it is rather dif cult. This paper proposes a new framework for the fault propagation path modeling method of power systems based ...
Huang, Tao   +6 more
core   +2 more sources

Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj   +1 more source

A taxonomy of malicious traffic for intrusion detection systems [PDF]

open access: yes, 2018
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert   +5 more
core   +4 more sources

Home - About - Disclaimer - Privacy