Academic literature on the topic 'Security analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security analysis"

1

Antonov, Petar, and Nikoleta Georgieva. "Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276–82. http://dx.doi.org/10.11610/isij.4719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (October 28, 2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.

Full text
Abstract:
This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabilities of the selected platforms and such specific ones.
APA, Harvard, Vancouver, ISO, and other styles
3

COMȘA, Andreea-Cristina. "Security Standards Analysis." International Journal of Information Security and Cybercrime 1, no. 2 (December 21, 2012): 25–30. http://dx.doi.org/10.19107/ijisc.2012.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

MIHAI, Ioan-Cosmin. "Security Standards Analysis." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 27–34. http://dx.doi.org/10.19107/ijisc.2013.02.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pandya, Vaibhav Ranchhoddas, and Mark Stamp. "iPhone Security Analysis." Journal of Information Security 01, no. 02 (2010): 74–87. http://dx.doi.org/10.4236/jis.2010.12009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Wei-Yu, Shing-Han Li, Mann-Jung Hsiao, Chung-Chiang Hu, and Kuo-Ching Tu. "Network Security Analysis by Using Business Intelligence." International Journal of Machine Learning and Computing 5, no. 6 (December 2015): 431–38. http://dx.doi.org/10.18178/ijmlc.2015.5.6.547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

YUM, D. H., J. H. SHIN, and P. J. LEE. "Security Analysis of Yeh-Tsai Security Mechanism." IEICE Transactions on Information and Systems E91-D, no. 5 (May 1, 2008): 1477–80. http://dx.doi.org/10.1093/ietisy/e91-d.5.1477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

rof. Dr. S.D. Joshi, Prof Y. C. Kulkarni, P. "Incorporating Security into SDLC Phases Using Security Analysis." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 07 (July 30, 2015): 6423–31. http://dx.doi.org/10.15680/ijircce.2015.0307010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Xiaochao, Cuicui Zhao, Kun Pan, Shuqiang Lin, Xiurong Chen, Benbin Chen, Deguang Le, Donghui Guo, and Xiaochao Li. "On the Security Analysis of PBKDF2 in OpenOffice." Journal of Software 10, no. 2 (February 2015): 116–26. http://dx.doi.org/10.17706/jsw.10.2.116-126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

CIOACĂ, Cătălin, Alexandru BRATU, and Daniel ȘTEFĂNESCU. "THE ANALYSIS OF BENCHMARKING APPLICATION IN CYBER SECURITY." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 19, no. 2 (July 31, 2017): 57–62. http://dx.doi.org/10.19062/2247-3173.2017.19.2.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security analysis"

1

Hassan, Aamir, and Fida Mohammad. "Network Security Analysis." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.

Full text
Abstract:

Security  is  the second step after  that a successful network has been deployed. There are many  types  of  attacks  that  could  potentially  harm  the  network  and  an  administrator should  carefully  document  and  plan  the  weak  areas,  where  the  network  could  be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security.  This  thesis  addresses  all  the  possible  tools  and  techniques  that  attackers  use  to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable  tools  to get  the  results.  It  is  important  to note  that most  of  the attention  in  network  security  is  given  to  the  router,  but  far  less  attention  is  given  to securing a switch. This  thesis will also address some more ways of securing a switch, if there is no router in the network. 


The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
APA, Harvard, Vancouver, ISO, and other styles
2

Chivers, Howard Robert. "Security design analysis." Thesis, University of York, 2006. http://etheses.whiterose.ac.uk/9885/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fadil, Yousra Ahmed. "Security analysis of steganalyzers." Thesis, Bourgogne Franche-Comté, 2017. http://www.theses.fr/2017UBFCD015/document.

Full text
Abstract:
De nos jours, le développement de la stéganalyse et de la stéganographie est incontournable, et peut être utilisé à des fins légales comme illégales, comme dans toute autre application. Le travail présenté dans cette thèse, se concentrant sur ces questions, est divisée en trois parties. La première partie concerne les paramètres permettant d’accroître le niveau de sécurité de la stéganographie afin de faire face aux techniques de stéganalyse. La contribution apportée dans cette première partie concerne l’étude de l’effet de la charge utile, l’extraction des caractéristiques, ainsi que le groupe d’images utilisées dans la phase d’apprentissage et la phase de test. Les résultats des simulations montrent que les techniques de stéganalyse de l’ état de l’art échouent dans la détection des messages secrets intégrés dans les images quand les paramètres changent entre l’apprentissage et le test. Dans la deuxième partie, nous étudions l’impact de la combinaison de plusieurs méthodes stéganographiques sur la détection des messages secrets. Ce travail prend en considération qu’il n’existe pas une procédure idéale, mais que le stéganographieur pourra utiliser n’importe quel schéma ainsi que n’importe quel taux d’embarquement. Dans la troisième et dernière partie, on propose une méthode qui calcule une carte de distorsion précise, en fonction de la dérivée seconde de l’image. La dérivée seconde est utilisée afin de calculer les courbes de niveau, ensuite le message va être caché dans l’image en écartant les courbes de niveaux inférieurs à un certain seuil. Les résultats expérimentaux démontrent que le niveau de sécurité est acceptable comparé aux méthodes stéganographiques de l’état de l’art
In the recent time, the field of image steganalysis and steganography became more important due to the development in the Internet domain. It is important to keep in mind that the whole process of steganography and steganalysis can be used for legal or illegal operations like any other applications. The work in this thesis can be divided inthree parts. The first one concentrates on parameters that increase the security of steganography methods against steganalysis techniques. In this contribution the effect of the payload, feature extractions, and group of images that are used in the learning stage and testing stage for the steganalysis system are studied. From simulation, we note that the state of the art steganalyzer fails to detect the presence of a secret message when some parameters are changed. In the second part, we study how the presence of many steganography methods may influence the detection of a secret message. The work takes into consideration that there is no ideal situation to embed a secret message when the steganographier can use any scheme with any payloads. In the third part, we propose a method to compute an accurate distortion map depending on a second order derivative of the image. The second order derivative is used to compute the level curve and to embed the message on pixels outside clean level curves. The results of embedding a secret message with our method demonstrate that the result is acceptable according to state of the art steganography
APA, Harvard, Vancouver, ISO, and other styles
4

Duan, Shuwen. "Security Analysis of TETRA." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-23055.

Full text
Abstract:
TETRA is designed to be used in private mobile radio environment, and PMR users have a requirement for high level of security. Security takes a number of different forms, both in terms of availability, reliability of the system and confidentiality of transmitted information. This thesis identified the key security features of TETRA system which includes authentication, encryption and key management. A formal security analysis of authentication protocol was made exploring possible attacks during authentication. The automatic security verification tool used in this thesis is Scyther. Inspired by the result given by Scyther, possible attacks were discussed with different scenarios. It was concluded that some of the attacks found by Scyther might not be the most efficient ones due to their complexity.
APA, Harvard, Vancouver, ISO, and other styles
5

Marceau, Richard J. "Mechanizing dynamic security analysis." Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=41244.

Full text
Abstract:
The object of software frameworks is to mechanize human processes in order to accomplish high-level tasks that call upon diverse software tools. This thesis describes the ELISA framework prototype which performs power-system dynamic security analysis in the operations planning environment. ELISA mechanizes routines traditionally carried out by experts that are essential to power-system dynamic security analysis, greatly accelerating the realization of complex processes. Typically, ELISA executes appropriate load-flow and transient-stability simulations (i.e. using commercially available simulation software), performs result analysis, identifies and executes changes to the input and repeats this process until a user-defined goal, such as finding transient stability transfer limits, has been achieved.
A taxonomy of dynamic security analysis in operations planning is proposed employing the semantic net, class-object-property and rule paradigms. All of these are required to cover the full spectrum of knowledge found in the high-level goals, the process details, the complex conditional structures and the acceptance criteria which characterize dynamic security analysis. This taxonomy also describes the language of operations planners, defining not only the features presently supported by ELISA, but also providing a roadmap to future enhancements. Typical sensitivity studies are presented using a 700-bus production model of the Hydro-Quebec network to illustrate the considerable leverage afforded from using ELISA-like software.
In addition, the thesis addresses the issue of how such tools can assist in performing research to improve our understanding of fundamental power systems behaviour. Using the ELISA prototype as a laboratory test bed, it is shown that the signal energy E of a network's transient response acts as a barometer to define the relative severity of any normal contingency with respect to power generation or transfer P. For a given contingency, as P is varied and the network approaches instability, signal energy increases smoothly and predictably towards an asymptote which defines the network's stability limit: This limit, in turn, permits us to compare the severity of different contingencies. This behaviour can be explained in terms of the effect of increasing power on the damping component of dominant poles, and a simple function is derived which estimates network stability limits with surprising accuracy from two or three stable simulations.
As a corollary to this, it is also shown that a network's transient response can be screened for instability using a simple frequency-domain criterion. Essentially, this criterion requires performing the Fourier transform of a network's transient voltage response at various monitoring locations: When P is varied and the network goes beyond its stability limit, the angle of the Fourier transform's polar plot fundamentally changes its behaviour, passing from a clockwise to a counterclockwise rotational behaviour about the origin. This is confirmed by results obtained from performing stability-limit searches on the Hydro-Quebec system. Used in conjunction with signal energy analysis for determining stability limit proximity, this criterion can be quite useful for mechanized security-limit-determination tools such as ELISA.
Signal energy limit estimation and the proposed stability criterion are shown to be applicable to all normal contingencies and these results hold not-withstanding the presence of many active, nonlinear elements in the network.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Emily Yujie. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/320159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Mandy Huaman. "Security Analysis: Meritage Homes." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.

Full text
Abstract:
This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate how SE Android can be used to improve application security. The proof-of-concept policy is then analyzed to determine if security goals are met.
APA, Harvard, Vancouver, ISO, and other styles
9

Tian, Ke. "Learning-based Cyber Security Analysis and Binary Customization for Security." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/85013.

Full text
Abstract:
This thesis presents machine-learning based malware detection and post-detection rewriting techniques for mobile and web security problems. In mobile malware detection, we focus on detecting repackaged mobile malware. We design and demonstrate an Android repackaged malware detection technique based on code heterogeneity analysis. In post-detection rewriting, we aim at enhancing app security with bytecode rewriting. We describe how flow- and sink-based risk prioritization improves the rewriting scalability. We build an interface prototype with natural language processing, in order to customize apps according to natural language inputs. In web malware detection for Iframe injection, we present a tag-level detection system that aims to detect the injection of malicious Iframes for both online and offline cases. Our system detects malicious iframe by combining selective multi-execution and machine learning algorithms. We design multiple contextual features, considering Iframe style, destination and context properties.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
10

Donta, Praveen Kumar. "Performance Analysis of Security Protocols." UNF Digital Commons, 2007. http://digitalcommons.unf.edu/etd/172.

Full text
Abstract:
Security is critical to a wide range of applications and services. Numerous security mechanisms and protocols have been developed and are widely used with today’s Internet. These protocols, which provide secrecy, authentication, and integrity control, are essential to protecting electronic information. There are many types of security protocols and mechanisms, such as symmetric key algorithms, asymmetric key algorithms, message digests, digital certificates, and secure socket layer (SSL) communication. Symmetric and asymmetric key algorithms provide secrecy. Message digests are used for authentication. SSL communication provides a secure connection between two sockets. The purpose of this graduate project was to do performance analysis on various security protocols. These are performance comparisons of symmetric key algorithms DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard), and RC4; of public-private key algorithms RSA and ElGamal; of digital certificates using message digests SHA1 (Secure Hash Algorithm) and MD5; and of SSL (Secure Sockets Layer) communication using security algorithms 3DES with SHA1 and RC4 with MD5.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security analysis"

1

1895-, Dodd David L., ed. Security analysis. 6th ed. New York: McGraw-Hill, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Benjamin, Graham. Security Analysis. New York: McGraw-Hill, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Information security risk analysis. 2nd ed. Boca Raton: Auerbach Publications, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Information security risk analysis. 3rd ed. Boca Raton, FL: Auerbach Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Information security risk analysis. Boca Raton, FL: Auerbach, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

J, Jordan Ronald, ed. Security analysis and portfolio management. 6th ed. Englewood Cliffs, N.J: Prentice Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

J, Jordan Ronald, ed. Security analysis and portfolio management. 4th ed. Englewood Cliffs, N.J: Prentice-Hall, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fischer, Donald E. Security analysis and portfolio management. 4th ed. London: Prentice-Hall International, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fischer, Donald E. Security analysis and portfolio management. 5th ed. Englewood Cliffs (N.J.): Prentice-Hall International, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

J, Jordan Ronald, ed. Security analysis and portfolio management. 5th ed. Englewood Cliffs, N.J: Prentice Hall, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security analysis"

1

Perrig, Adrian, Pawel Szalachowski, Raphael M. Reischuk, and Laurent Chuat. "Security Analysis." In Information Security and Cryptography, 301–30. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67080-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Ramona. "Security Analysis." In Quantum Key Distribution, 117–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73991-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chuat, Laurent, Markus Legner, David Basin, David Hausheer, Samuel Hitz, Peter Müller, and Adrian Perrig. "Security Analysis." In The Complete Guide to SCION, 157–81. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05288-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stanley, Richard. "Information Security." In Cybercrimes: A Multidisciplinary Analysis, 95–126. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13547-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McEvoy, Neil, and Andrew Whitcombe. "Structured Risk Analysis." In Infrastructure Security, 88–103. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45831-x_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wanderley, E., R. Vaslin, J. Crenne, P. Cotret, G. Gogniat, J. P. Diguet, J. L. Danger, et al. "Security FPGA Analysis." In Security Trends for FPGAS, 7–46. Dordrecht: Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-1338-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khattab, Ahmed, Zahra Jeddi, Esmaeil Amini, and Magdy Bayoumi. "RBS Security Analysis." In Analog Circuits and Signal Processing, 101–16. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47545-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Landoll, Douglas. "Security Risk Analysis." In The Security Risk Assessment Handbook, 347–88. 3rd ed. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003090441-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Malcik, Dominik, and Martin Drahansky. "Microscopic Analysis of Chips." In Security Technology, 113–22. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-27189-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zanotti, Mirko. "Security Typings by Abstract Interpretation." In Static Analysis, 360–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45789-5_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security analysis"

1

Kamatchi, R., Atanu Rakshit, Theodore E. Simos, George Psihoyios, Ch Tsitouras, and Zacharias Anastassi. "Security Broker—A Complementary Tool for SOA Security." In NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2011: International Conference on Numerical Analysis and Applied Mathematics. AIP, 2011. http://dx.doi.org/10.1063/1.3637804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Augutis, J., R. Krikštolaitis, and E. Ušpuras. "Lithuanian activities in energy security." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Axelrod, C. W. "Bridging the safety-security software gap." In RISK ANALYSIS 2014. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/risk140401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang, and Anoop Singhal. "Automatic security analysis using security metrics." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Augutis, J., S. Pečiulytė, R. Krikštolaitis, I. Žutautaitė, and E. Ušpuras. "Dynamic model for energy security level assessment." In RISK ANALYSIS 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/risk120031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liang, Tianbao. "Airport Security Analysis." In 2017 7th International Conference on Education and Management (ICEM 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/icem-17.2018.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Shu, and Hongliang Jiang. "School network security analysis and security countermeasures." In 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2012. http://dx.doi.org/10.1109/cyber.2012.6320061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huang, Zhen, and Gang Tan. "Rapid Vulnerability Mitigation with Security Workarounds." In Workshop on Binary Analysis Research. Reston, VA: Internet Society, 2019. http://dx.doi.org/10.14722/bar.2019.23052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yilmaz, İsmail. "Network systems security analysis." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2015. http://dx.doi.org/10.1117/12.2180164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cu, Vinh Loc, Jean-Christophe Burie, Jean-Marc Ogier, and Cheng-Lin Liu. "Hiding Security Feature Into Text Content for Securing Documents Using Generated Font." In 2019 International Conference on Document Analysis and Recognition (ICDAR). IEEE, 2019. http://dx.doi.org/10.1109/icdar.2019.00196.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security analysis"

1

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Upgrades Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Target Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Murphy, S. BGP Security Vulnerabilities Analysis. RFC Editor, January 2006. http://dx.doi.org/10.17487/rfc4272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Reps, Thomas W. Cross-Boundary Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, April 2013. http://dx.doi.org/10.21236/ada575881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simic, Bojan, Arshan Dabirsiaghi, and Jeff Williams. Library Code Security Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2013. http://dx.doi.org/10.21236/ada589844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sweeney, D. J. DOE Integrated Security System (DISS) preliminary communication security analysis. Office of Scientific and Technical Information (OSTI), October 1993. http://dx.doi.org/10.2172/45585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ferguson, Mel. Geostrategic Security Analysis of Israel. Fort Belvoir, VA: Defense Technical Information Center, January 2001. http://dx.doi.org/10.21236/ada441496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Target Analysis-rev. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126556.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Singh, Surinder Paul, Philip W. Gibbs, and Garl A. Bultz. Nuclear Security: Protracted Theft Analysis. Office of Scientific and Technical Information (OSTI), March 2014. http://dx.doi.org/10.2172/1126567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gallaher, Michael P., Brent R. Rowe, Alex V. Rogozhin, and Albert N. Link. Economic Analysis of Cyber Security. Fort Belvoir, VA: Defense Technical Information Center, July 2006. http://dx.doi.org/10.21236/ada455398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography