Academic literature on the topic 'Security analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security analysis"
Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276–82. http://dx.doi.org/10.11610/isij.4719.
Full textPetkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.
Full textCOMȘA, Andreea-Cristina. "Security Standards Analysis." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 25–30. http://dx.doi.org/10.19107/ijisc.2012.02.03.
Full textMIHAI, Ioan-Cosmin. "Security Standards Analysis." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 27–34. http://dx.doi.org/10.19107/ijisc.2013.02.03.
Full textPandya, Vaibhav Ranchhoddas, and Mark Stamp. "iPhone Security Analysis." Journal of Information Security 01, no. 02 (2010): 74–87. http://dx.doi.org/10.4236/jis.2010.12009.
Full textChen, Wei-Yu, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu. "Network Security Analysis by Using Business Intelligence." International Journal of Machine Learning and Computing 5, no. 6 (December 2015): 431–38. http://dx.doi.org/10.18178/ijmlc.2015.5.6.547.
Full textYUM, D. H., J. H. SHIN, and P. J. LEE. "Security Analysis of Yeh-Tsai Security Mechanism." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1477–80. http://dx.doi.org/10.1093/ietisy/e91-d.5.1477.
Full textrof. Dr. S.D. Joshi, Prof Y. C. Kulkarni, P. "Incorporating Security into SDLC Phases Using Security Analysis." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (July 30, 2015): 6423–31. http://dx.doi.org/10.15680/ijircce.2015.0307010.
Full textLi, Xiaochao, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo, and Xiaochao Li. "On the Security Analysis of PBKDF2 in OpenOffice." Journal of Software 10, no. 2 (February 2015): 116–26. http://dx.doi.org/10.17706/jsw.10.2.116-126.
Full textCIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.
Full textDissertations / Theses on the topic "Security analysis"
Hassan, Aamir, and Fida Mohammad. "Network Security Analysis." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.
Full textSecurity is the second step after that a successful network has been deployed. There are many types of attacks that could potentially harm the network and an administrator should carefully document and plan the weak areas, where the network could be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security. This thesis addresses all the possible tools and techniques that attackers use to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable tools to get the results. It is important to note that most of the attention in network security is given to the router, but far less attention is given to securing a switch. This thesis will also address some more ways of securing a switch, if there is no router in the network.
The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
Chivers, Howard Robert. "Security design analysis." Thesis, University of York, 2006. http://etheses.whiterose.ac.uk/9885/.
Full textFadil, Yousra Ahmed. "Security analysis of steganalyzers." Thesis, Bourgogne Franche-Comté, 2017. http://www.theses.fr/2017UBFCD015/document.
Full textIn the recent time, the field of image steganalysis and steganography became more important due to the development in the Internet domain. It is important to keep in mind that the whole process of steganography and steganalysis can be used for legal or illegal operations like any other applications. The work in this thesis can be divided inthree parts. The first one concentrates on parameters that increase the security of steganography methods against steganalysis techniques. In this contribution the effect of the payload, feature extractions, and group of images that are used in the learning stage and testing stage for the steganalysis system are studied. From simulation, we note that the state of the art steganalyzer fails to detect the presence of a secret message when some parameters are changed. In the second part, we study how the presence of many steganography methods may influence the detection of a secret message. The work takes into consideration that there is no ideal situation to embed a secret message when the steganographier can use any scheme with any payloads. In the third part, we propose a method to compute an accurate distortion map depending on a second order derivative of the image. The second order derivative is used to compute the level curve and to embed the message on pixels outside clean level curves. The results of embedding a secret message with our method demonstrate that the result is acceptable according to state of the art steganography
Duan, Shuwen. "Security Analysis of TETRA." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23055.
Full textMarceau, Richard J. "Mechanizing dynamic security analysis." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41244.
Full textA taxonomy of dynamic security analysis in operations planning is proposed employing the semantic net, class-object-property and rule paradigms. All of these are required to cover the full spectrum of knowledge found in the high-level goals, the process details, the complex conditional structures and the acceptance criteria which characterize dynamic security analysis. This taxonomy also describes the language of operations planners, defining not only the features presently supported by ELISA, but also providing a roadmap to future enhancements. Typical sensitivity studies are presented using a 700-bus production model of the Hydro-Quebec network to illustrate the considerable leverage afforded from using ELISA-like software.
In addition, the thesis addresses the issue of how such tools can assist in performing research to improve our understanding of fundamental power systems behaviour. Using the ELISA prototype as a laboratory test bed, it is shown that the signal energy E of a network's transient response acts as a barometer to define the relative severity of any normal contingency with respect to power generation or transfer P. For a given contingency, as P is varied and the network approaches instability, signal energy increases smoothly and predictably towards an asymptote which defines the network's stability limit: This limit, in turn, permits us to compare the severity of different contingencies. This behaviour can be explained in terms of the effect of increasing power on the damping component of dominant poles, and a simple function is derived which estimates network stability limits with surprising accuracy from two or three stable simulations.
As a corollary to this, it is also shown that a network's transient response can be screened for instability using a simple frequency-domain criterion. Essentially, this criterion requires performing the Fourier transform of a network's transient voltage response at various monitoring locations: When P is varied and the network goes beyond its stability limit, the angle of the Fourier transform's polar plot fundamentally changes its behaviour, passing from a clockwise to a counterclockwise rotational behaviour about the origin. This is confirmed by results obtained from performing stability-limit searches on the Hydro-Quebec system. Used in conjunction with signal energy analysis for determining stability limit proximity, this criterion can be quite useful for mechanized security-limit-determination tools such as ELISA.
Signal energy limit estimation and the proposed stability criterion are shown to be applicable to all normal contingencies and these results hold not-withstanding the presence of many active, nonlinear elements in the network.
Huang, Emily Yujie. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/320159.
Full textWang, Mandy Huaman. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322089.
Full textRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Full textTian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.
Full textPh. D.
Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.
Full textBooks on the topic "Security analysis"
Information security risk analysis. 2nd ed. Boca Raton: Auerbach Publications, 2005.
Find full textInformation security risk analysis. 3rd ed. Boca Raton, FL: Auerbach Publications, 2010.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 6th ed. Englewood Cliffs, N.J: Prentice Hall, 1995.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 4th ed. Englewood Cliffs, N.J: Prentice-Hall, 1987.
Find full textFischer, Donald E. Security analysis and portfolio management. 4th ed. London: Prentice-Hall International, 1987.
Find full textFischer, Donald E. Security analysis and portfolio management. 5th ed. Englewood Cliffs (N.J.): Prentice-Hall International, 1991.
Find full textJ, Jordan Ronald, ed. Security analysis and portfolio management. 5th ed. Englewood Cliffs, N.J: Prentice Hall, 1991.
Find full textBook chapters on the topic "Security analysis"
Perrig, Adrian, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. "Security Analysis." In Information Security and Cryptography, 301–30. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67080-5_13.
Full textWolf, Ramona. "Security Analysis." In Quantum Key Distribution, 117–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_5.
Full textChuat, Laurent, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter Müller, and Adrian Perrig. "Security Analysis." In The Complete Guide to SCION, 157–81. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05288-0_7.
Full textStanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.
Full textMcEvoy, Neil, and Andrew Whitcombe. "Structured Risk Analysis." In Infrastructure Security, 88–103. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45831-x_7.
Full textWanderley, E., R. Vaslin, J. Crenne, P. Cotret, G. Gogniat, J. P. Diguet, J. L. Danger, et al. "Security FPGA Analysis." In Security Trends for FPGAS, 7–46. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-1338-3_2.
Full textKhattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Security Analysis." In Analog Circuits and Signal Processing, 101–16. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_5.
Full textLandoll, Douglas. "Security Risk Analysis." In The Security Risk Assessment Handbook, 347–88. 3rd ed. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003090441-9.
Full textMalcik, Dominik, and Martin Drahansky. "Microscopic Analysis of Chips." In Security Technology, 113–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27189-2_12.
Full textZanotti, Mirko. "Security Typings by Abstract Interpretation." In Static Analysis, 360–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45789-5_26.
Full textConference papers on the topic "Security analysis"
Kamatchi, R., Atanu Rakshit, Theodore E. Simos, George Psihoyios, Ch Tsitouras, and Zacharias Anastassi. "Security Broker—A Complementary Tool for SOA Security." In NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2011: International Conference on Numerical Analysis and Applied Mathematics. AIP, 2011. http://dx.doi.org/10.1063/1.3637804.
Full textAugutis, J., R. Krikštolaitis, and E. Ušpuras. "Lithuanian activities in energy security." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120011.
Full textAxelrod, C. W. "Bridging the safety-security software gap." In RISK ANALYSIS 2014. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/risk140401.
Full textKun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang, and Anoop Singhal. "Automatic security analysis using security metrics." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127465.
Full textAugutis, J., S. Pečiulytė, R. Krikštolaitis, I. Žutautaitė, and E. Ušpuras. "Dynamic model for energy security level assessment." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120031.
Full textLiang, Tianbao. "Airport Security Analysis." In 2017 7th International Conference on Education and Management (ICEM 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icem-17.2018.30.
Full textLiu, Shu, and Hongliang Jiang. "School network security analysis and security countermeasures." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6320061.
Full textHuang, Zhen, and Gang Tan. "Rapid Vulnerability Mitigation with Security Workarounds." In Workshop on Binary Analysis Research. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/bar.2019.23052.
Full textYilmaz, İsmail. "Network systems security analysis." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2015. http://dx.doi.org/10.1117/12.2180164.
Full textCu, Vinh Loc, Jean-Christophe Burie, Jean-Marc Ogier, and Cheng-Lin Liu. "Hiding Security Feature Into Text Content for Securing Documents Using Generated Font." In 2019 International Conference on Document Analysis and Recognition (ICDAR). IEEE, 2019. http://dx.doi.org/10.1109/icdar.2019.00196.
Full textReports on the topic "Security analysis"
Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Upgrades Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126568.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Target Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126570.
Full textMurphy, S. BGP Security Vulnerabilities Analysis. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4272.
Full textReps, Thomas W. Cross-Boundary Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada575881.
Full textSimic, Bojan, Arshan Dabirsiaghi, and Jeff Williams. Library Code Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada589844.
Full textSweeney, D. J. DOE Integrated Security System (DISS) preliminary communication security analysis. Office of Scientific and Technical Information (OSTI), October 1993. http://dx.doi.org/10.2172/45585.
Full textFerguson, Mel. Geostrategic Security Analysis of Israel. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada441496.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Target Analysis-rev. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126556.
Full textSingh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Protracted Theft Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126567.
Full textGallaher, Michael P., Brent R. Rowe, Alex V. Rogozhin, and Albert N. Link. Economic Analysis of Cyber Security. Fort Belvoir, VA: Defense Technical Information Center, July 2006. http://dx.doi.org/10.21236/ada455398.
Full text