• Aucun résultat trouvé

Test and Security

Transforming and selecting functional test cases for security policy testing

Transforming and selecting functional test cases for security policy testing

... Conclusion and Future Work In this paper, we presented a new automated ap- proach for selecting and adapting the functional tests in the context of SP ...tests and the triggered SP ...into ...

11

Development of a Speech Security Quick Test and Software

Development of a Speech Security Quick Test and Software

... FSST LD(avg) Both NF TL TL(avg) 3.0 ±0.5 Fig. 9 QT LD(avg) OMNI FF FSST LD(avg) 2.4 ±0.2 Fig. 12(a) 2 QT LD(avg) OMNI HF FSST LD(avg) 1.3 ±0.4 Fig. 12(a) 2 QT LD(avg) OMNI NF FSST LD(avg) 0.7 ±0.2 Fig. 12(a) 2 QT LD(avg) ...

59

A Security Ontology for Security Requirements Elicitation

A Security Ontology for Security Requirements Elicitation

... [33] and Protégé ...constraints, and extracting ontologies and knowledge ...To test and extract relevant knowledge from the security ontology, SQWRL (Semantic Query-Enhanced Web ...

22

Security Techniques for Test Infrastructures

Security Techniques for Test Infrastructures

... a security-aware testing is a pressing matter for all modern electronic ...Invasive test infrastruc- tures are mandatory for granting the successful production of defect-free integrated ...digital ...

168

Evaluations of new speech security quick test

Evaluations of new speech security quick test

... quick test the microphone in the receiving space was located at 8 of the positions used in the full test and indicated on ...both test procedures the microphone in the receiving space was ...

84

Feasibility of a Speech Security Quick Test

Feasibility of a Speech Security Quick Test

... wall-with-a-door and for the 3 absorption cases. For the full foam and the no foam cases the STC and the R w values were all ...STC and R w were both ...removing test frame holding the ...

85

Automatic reconstruction and analysis of security policies from deployed security components

Automatic reconstruction and analysis of security policies from deployed security components

... method and tool to discover and test a network security policy is ...method and tool (FANG) to discover and test the global firewall ...collects and reads all the ...

157

Security Mechanisms Planning to Enforce Security Policies

Security Mechanisms Planning to Enforce Security Policies

... all security properties that can be required by data owners as each approach can provide at most two security ...etc.) and the data structure on which the security policy should be enforced, ...

17

Oldrich Bures, Private Security Companies. Transforming Politics and Security in the Czech Republic

Oldrich Bures, Private Security Companies. Transforming Politics and Security in the Czech Republic

... transformed security – through their offer and practices, and in the absence of the State − into a private, excludable, rival and a-political good available on a ...of security is ...

5

Watermarking security

Watermarking security

... technique and the same secret ...the security level of a technique starts with the assumption that the attacker knows everything except the secret ...embedding and the decoding ...write, and ...

31

Trading and rational security pricing bubbles

Trading and rational security pricing bubbles

... g and z j = min f0; z j ...a security - in other words, giving a cash loan and receiving a security as collateral that is worth ...banks and insurance companies) do not face such ...

38

Privacy and Security in E-Learning

Privacy and Security in E-Learning

... parties, and the amount of information being ...timing, and origin and destination of communications, a snooper can deduce relationships between ...students and employers to keep their network ...

21

Semantics and Security Issues in JavaScript

Semantics and Security Issues in JavaScript

... 2.6 Higher-order functions Functions in JavaScript, as first class citizens, can be passed as parameters to functions and returned from functions. Higher-order functions are most commonly seen when implementing ...

40

Towards Safety and Security Co-engineering

Towards Safety and Security Co-engineering

... safety and security engineering will demand and integration of both safety and security ...safety and security aspects is required, such integration does not suffice to ...

15

Security in Cloud Computing: Evaluation and Integration

Security in Cloud Computing: Evaluation and Integration

... sition and Optimal Selection (SCOS). Rare is the work that highlighted security satisfaction in the operations of service composition in the ...QoS and security, with the objective of ...

261

Security Transitions

Security Transitions

... level and, for consistency, we report results for the most de- manding specifications at this ...in security perceptions matches the changes we observed in the tactical ...reported security improved ...

79

Security monitoring for network protocols and applications

Security monitoring for network protocols and applications

... host and the traffic containing that User-Agent string corresponded to a botnet ...callbacks and communicated with the command and control (C&C) server by injecting what they want to exchange in ...

130

Machine Learning and Statistical Verification for Security

Machine Learning and Statistical Verification for Security

... Three early stop cases are considered for each set of models, one where the last concerned SCC has a low topological order meaning that the upper graph has a no- tably smaller size (in number of SCCs) than the lower ...

139

Security and privacy issues in cloud computing

Security and privacy issues in cloud computing

... Farooqi and Farrukh Aslam Khan presents the approach by modifying the low-energy adaptive clustering hierarchy (LEACH) protocol for wireless sensor networks (WSNs) and adding the functionality of intrusion ...

4

Optimizing System Architecture Cost and Security Countermeasures

Optimizing System Architecture Cost and Security Countermeasures

... for security events (attacks) and the probability of occurrence for ...attackers and defenders using game theory in order to find the set of countermeasures that has the most effective ...cost ...

20

Show all 10000 documents...

Sujets connexes