Contents
Academic literature on the topic 'Metric Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Metric Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Metric Security"
Neto, Afonso Araújo, and Marco Vieira. "Benchmarking Untrustworthiness." International Journal of Dependable and Trustworthy Information Systems 1, no. 2 (2010): 32–54. http://dx.doi.org/10.4018/jdtis.2010040102.
Full textShan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.
Full textDíaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Full textYee, George O. M. "Designing Sound Security Metrics." International Journal of Systems and Software Security and Protection 10, no. 1 (2019): 1–21. http://dx.doi.org/10.4018/ijsssp.2019010101.
Full textShao, Yanli, Jingru Zhao, Xingqi Wang, Weiwei Wu, and Jinglong Fang. "Research on Cross-Company Defect Prediction Method to Improve Software Security." Security and Communication Networks 2021 (August 24, 2021): 1–19. http://dx.doi.org/10.1155/2021/5558561.
Full textTjirare, D., and F. Bhunu Shava. "Developing Security Metrics to Evaluate Employee Awareness: a Case of a Ministry in Namibia." Namibian Journal for Research, Science and Technology 1, no. 1 (2020): 11–18. http://dx.doi.org/10.54421/njrst.v1i1.5.
Full textJouini, Mouna, and Latifa Ben Arfa Rabai. "A Security Risk Management Metric for Cloud Computing Systems." International Journal of Organizational and Collective Intelligence 4, no. 3 (2014): 1–21. http://dx.doi.org/10.4018/ijoci.2014070101.
Full textLe, Ngoc Thuy, and Doan B. Hoang. "A Threat Computation Model using a Markov Chain and Common Vulnerability Scoring System and its Application to Cloud Security." Journal of Telecommunications and the Digital Economy 7, no. 1 (2019): 37–56. http://dx.doi.org/10.18080/jtde.v7n1.181.
Full textKim, Kisoo, Sangho Lee, Yeowung Yun, Jaemin Choi, and Hyungjin Mun. "Security Evaluation Metric of Windows-Based Information Security Products." Indian Journal of Science and Technology 8, S8 (2015): 10. http://dx.doi.org/10.17485/ijst/2015/v8is8/71501.
Full textIto, Kosuke, Shuji Morisaki, and Atsuhiro Goto. "IoT Security-Quality-Metrics Method and Its Conformity with Emerging Guidelines." IoT 2, no. 4 (2021): 761–85. http://dx.doi.org/10.3390/iot2040038.
Full text