Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +1 more source
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model [PDF]
Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging.
Huamin Yang +7 more
core +2 more sources
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj +1 more source
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments [PDF]
With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption,
Joshi, JBD, Takabi, H, Zargar, ST
core +2 more sources
Revisiting Employment Vulnerability Index Using Principal Component Analysis
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj +1 more source
Natural Hazards / Micro-sized enterprises: vulnerability to flash floods [PDF]
in dt. Sprache nicht verf\ufcgbarIn the framework of risk assessment for flash floods, vulnerability is a key concept to assess the susceptibility of elements at risk.
Fuchs, Sven +4 more
core +1 more source
A method to assess demand growth vulnerability of travel times on road network links
Many national governments around the world have turned their recent focus to monitoring the actual reliability of their road networks. In parallel there have been major research efforts aimed at developing modelling approaches for predicting the ...
Balijepalli +17 more
core +1 more source
Modeling Fault Propagation Paths in Power Systems: A New Framework Based on Event SNP Systems With Neurotransmitter Concentration [PDF]
To reveal fault propagation paths is one of the most critical studies for the analysis of power system security; however, it is rather dif cult. This paper proposes a new framework for the fault propagation path modeling method of power systems based ...
Huang, Tao +6 more
core +2 more sources
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj +1 more source
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources

