Academic literature on the topic 'Security Monitors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Monitors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security Monitors"
Chevalier, Yannick, and Michaël Rusinowitch. "Implementing Security Protocol Monitors." Electronic Proceedings in Theoretical Computer Science 342 (September 6, 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.
Full textBadger, L. "Information security: from reference monitors to wrappers." IEEE Aerospace and Electronic Systems Magazine 13, no. 3 (March 1998): 32–33. http://dx.doi.org/10.1109/62.659861.
Full textNarasimhan, Seetharam, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, and Swarup Bhunia. "Improving IC Security Against Trojan Attacks Through Integration of Security Monitors." IEEE Design & Test of Computers 29, no. 5 (October 2012): 37–46. http://dx.doi.org/10.1109/mdt.2012.2210183.
Full textMagazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly inlining of dynamic security monitors." Computers & Security 31, no. 7 (October 2012): 827–43. http://dx.doi.org/10.1016/j.cose.2011.10.002.
Full textWoods, David, Stephanie McNee, James W. Davis, Alexander Morison, Patrick Maughan, and Klaus Christoffersen. "Event Template Hierarchies as Means for Human-Automation Collaboration in Security Surveillance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 3 (September 2005): 302–6. http://dx.doi.org/10.1177/154193120504900319.
Full textDeyglun, C. "Testing and performances of Spectroscopic Radiation Portal Monitor for homeland security." EPJ Web of Conferences 225 (2020): 07008. http://dx.doi.org/10.1051/epjconf/202022507008.
Full textAlbeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.
Full textFreysdóttir, Gerður Rán, Kristín Björnsdóttir, and Margrét Hrönn Svavarsdóttir. "Nurses’ use of monitors in patient surveillance: an ethnographic study on a coronary care unit." European Journal of Cardiovascular Nursing 18, no. 4 (November 30, 2018): 272–79. http://dx.doi.org/10.1177/1474515118816930.
Full textKarger, Paul A., and David R. Safford. "I/O for Virtual Machine Monitors: Security and Performance Issues." IEEE Security & Privacy Magazine 6, no. 5 (September 2008): 16–23. http://dx.doi.org/10.1109/msp.2008.119.
Full textKhoury, Raphaël, and Nadia Tawbi. "Which security policies are enforceable by runtime monitors? A survey." Computer Science Review 6, no. 1 (January 2012): 27–45. http://dx.doi.org/10.1016/j.cosrev.2012.01.001.
Full textDissertations / Theses on the topic "Security Monitors"
Khoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.
Full textExecution monitoring is an approach that seeks to allow an untrusted code to run safely by observing its execution and reacting if need be to prevent a potential violation of a user-supplied security policy. This method has many promising applications, particularly with respect to the safe execution of mobile code. Academic research on monitoring has generally focused on two questions. The first, relates to the set of policies that can be enforced by monitors under various constraints and the conditions under which this set can be extended. The second question deals with the way to inline a monitor into an untrusted or potentially malicious program in order to produce a new instrumented program that provably respects the desired security policy. This study builds on the two strands of research mentioned above and brings new insights to this study. It seeks, in the first place, to increase the scope of monitorable properties by suggesting a new approach of monitor inlining. By drawing on an a priori model of the program’s possible behavior, we develop a monitor that can enforce a strictly larger set of security properties. Furthermore, longstanding research has showed that a monitor that is allowed to transform its input is more powerful than one lacking this ability. Naturally, this ability must be constrained for the enforcement to be meaningful. Otherwise, if the monitor is given too broad a leeway to transform valid and invalid sequences, any property can be enforced, but not in a way that is useful or desirable. In this study, we propose two new enforcement paradigms which capture reasonable restrictions on a monitor’s ability to alter its input. We study the set of properties enforceable if these enforcement paradigms are used and give examples of real-life security policies that can be enforced using our approach.
Shankaranarayanan, Bharath. "Assertion-Based Monitors for Run-time Security Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1626356515627044.
Full textJoglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.
Full textRaja, Subashree. "Security Architecture and Dynamic Signal Selection for Post-Silicon Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623241837129969.
Full textVermeulen, Hester. "A balanced food basket approach to monitor food affordability in South Africa." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73175.
Full textThesis (PhD) - University of Pretoria. 2020.
Financial support received from: * The Bureau for Food and Agricultural Policy (BFAP) * The Department of Science and Technology (DST)/National Research Foundation (NRF) Centre of Excellence (CoE) in Food Security * Agbiz * Red Meat Research and Development South Africa (RMRD SA) * DST/NRF South African Research Chairs Initiative (SARChl) in the National Development Plan Priority Area of Nutrition and Food Security (Unique number: SARCI170808259212) * University of Pretoria
Animal and Wildlife Sciences
PhD Nutrition
Unrestricted
Nauditt, Alexandra. "Understanding stream flow generation in sparsely monitored montane catchments." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=233935.
Full textLeon, Vidalon Igmar, and Ampuero Pablo Jorge Medina. "Mejora al Proceso de Monitoreo Continuo de Vulnerabilidades." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/652805.
Full textThis research work aims to improve the Continuous Vulnerability Monitoring process of Technology Security Operations management, which greatly contributes to being prevented and greatly mitigating any problem that may take advantage of an external and internal threat from Mibanco. This research work contains six chapters, the main ones being the definition of the Theoretical Framework, the main concepts, antecedents were developed and the key words related to the main topic of this research work were defined; In the Project Development chapter the problem will be shown in more detail where the main problem is formulated and the improvement objective which would be focused on the substantial reduction of time with the support of information technologies.
Tesis
Lu, Lu. "IoT Network Watchdog." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34008.
Full textPASQUIER, JEAN-BAPTISTE. "Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo." Thesis, KTH, Industriell ekologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640.
Full textPatzina, Lars Verfasser], Andy [Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen / Lars Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110979053/34.
Full textBooks on the topic "Security Monitors"
United States. Congress. Commission on Security and Cooperation in Europe. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundredth Congress, first session, Helsinki monitors, October 22, 1987. Washington: U.S. G.P.O., 1988.
Find full textUnited States. Congress. Commission on Security and Cooperation in Europe. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundredth Congress, first session, Helsinki monitors, October 22, 1987. Washington: U.S. G.P.O., 1988.
Find full textUnited States. Government Accountability Office. Combating nuclear smuggling: DNDO has not yet collected most of the national laboratories' test results on radiation portal monitors in support of DNDO's testing and development program. Washington, D.C. (441 G St. NW, Washington 20548): United States Government Accountability Office, 2007.
Find full textNuclear smuggling detection: Recent tests of advanced spectroscopic portal monitors : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, March 5, 2008. Washington: U.S. G.P.O., 2008.
Find full textSullivan, Mike. Safety monitor: How to protect your kids online. Chicago: Bonus Books, 2002.
Find full textWoodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.
Find full textUnited, States Congress Senate Committee on Banking Housing and Urban Affairs Subcommittee on Security and International Trade and Finance. Equipping financial regulators with the tools necessary to monitor systemic risk: Hearing before the Subcommittee on Security and International Trade and Finance of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Eleventh Congress, second session, on examining the systemic risk aspect of regulatory reform, focusing on regulators' current capabilities to collect and analyze financial market data, and assessing what additional tools and resources are necessary to monitor and identify systemic risk, February 12, 2010. Washington: U.S. G.P.O., 2010.
Find full textAutomating security monitoring & analysis for Space Station Freedom's electric power system. [Washington, D.C.]: NASA, 1990.
Find full textHelfont, Samuel. Mechanisms of Control. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190843311.003.0011.
Full textBook chapters on the topic "Security Monitors"
Ribeiro, Carlos, André Zúquete, and Paulo Ferreira. "Enforcing Obligation with Security Monitors." In Information and Communications Security, 172–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45600-7_20.
Full textLemay, Frédérick, Raphaël Khoury, and Nadia Tawbi. "Optimized Inlining of Runtime Monitors." In Information Security Technology for Applications, 149–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29615-4_11.
Full textSchneider, Fred B. "Lifting Reference Monitors from the Kernel." In Formal Aspects of Security, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40981-6_1.
Full textTesterink, Bas, Nils Bulling, and Mehdi Dastani. "Security and Robustness for Collaborative Monitors." In Lecture Notes in Computer Science, 376–95. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42691-4_21.
Full textWang, Wenhao, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, and Shuang Hao. "SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks." In Computer Security, 122–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_7.
Full textLigatti, Jay, Lujo Bauer, and David Walker. "Enforcing Non-safety Security Policies with Program Monitors." In Computer Security – ESORICS 2005, 355–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11555827_21.
Full textFalcone, Yliès, Jean-Claude Fernandez, and Laurent Mounier. "Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties." In Information Systems Security, 41–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_3.
Full textBauer, Lujo, Jarred Ligatti, and David Walker. "Types and Effects for Non-interfering Program Monitors." In Software Security — Theories and Systems, 154–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36532-x_10.
Full textBoyer, Kirk, Hao Chen, Jingwei Chen, Jian Qiu, and Rinku Dewri. "A Characterization of the Mass Surveillance Potential of Road Traffic Monitors." In Information Systems Security, 3–23. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_1.
Full textMagazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly Inlining of Dynamic Security Monitors." In Security and Privacy – Silver Linings in the Cloud, 173–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15257-3_16.
Full textConference papers on the topic "Security Monitors"
Khan, Muhammad Umair Ahmed, and Mohammad Zulkernine. "Building components with embedded security monitors." In the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2000259.2000282.
Full textLeJeune, Keith, Jason Berberich, Jon Washburn, Markus Erbeldinger, and Jessica Sinclair. "Enzyme-polymer based environmental monitors." In SPIE Defense, Security, and Sensing, edited by Thomas George, M. Saif Islam, and Achyut K. Dutta. SPIE, 2010. http://dx.doi.org/10.1117/12.851063.
Full textMcDermott, John, Bruce Montrose, Margery Li, James Kirby, and Myong Kang. "Separation virtual machine monitors." In the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2421011.
Full textShiva, Sajjan, Ramya Dharam, and Vivek Shandilya. "Runtime Monitors as Sensors of Security Systems." In Parallel and Distributed Computing and Systems. Calgary,AB,Canada: ACTAPRESS, 2011. http://dx.doi.org/10.2316/p.2011.757-027.
Full textShiva, Sajjan, Ramya Dharam, and Vivek Shandilya. "Runtime Monitors as Sensors of Security Systems." In Parallel and Distributed Computing and Systems. Calgary,AB,Canada: ACTAPRESS, 2012. http://dx.doi.org/10.2316/p.2012.757-027.
Full textCappos, Justin, and Richard Weiss. "Teaching the security mindset with reference monitors." In the 45th ACM technical symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2538862.2538939.
Full textAskarov, Aslan, Stephen Chong, and Heiko Mantel. "Hybrid Monitors for Concurrent Noninterference." In 2015 IEEE 28th Computer Security Foundations Symposium (CSF). IEEE, 2015. http://dx.doi.org/10.1109/csf.2015.17.
Full textAssaf, Mounir, and David A. Naumann. "Calculational Design of Information Flow Monitors." In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, 2016. http://dx.doi.org/10.1109/csf.2016.22.
Full textKarlstedt, Tomi, Ville Leppänen, and Sanna Tuohimaa. "Embedding Rule-Based Security Monitors into Java Programs." In 2008 32nd Annual IEEE International Computer Software and Applications Conference. IEEE, 2008. http://dx.doi.org/10.1109/compsac.2008.150.
Full textAmorim, Arthur Azevedo de, Maxime Denes, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach. "Micro-Policies: Formally Verified, Tag-Based Security Monitors." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.55.
Full textReports on the topic "Security Monitors"
Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada633655.
Full textKaram, Lisa R., Leticia Pibida, Michael P. Unterweger, and Larry L. Lucas. Gamma-ray emitting test sources for portal monitors used for homeland security. Gaithersburg, MD: National Bureau of Standards, 2004. http://dx.doi.org/10.6028/nist.tn.1460.
Full textHeberlein, L. T., G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6223037.
Full textJohn Svoboda. Transmission Line Security Monitor: Final Report. Office of Scientific and Technical Information (OSTI), April 2011. http://dx.doi.org/10.2172/1016198.
Full textAuthor, Not Given. Modification of Transmission Line Security Monitor Sensor Platform. Office of Scientific and Technical Information (OSTI), January 2011. http://dx.doi.org/10.2172/1010663.
Full textIrvine, Cynthia E. The Reference Monitor Concept as a Unifying Principle in Computer Security Education. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada423529.
Full textSafeguarding through science: Center for Plant Health Science and Technology 2008 Accomplishments. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, December 2009. http://dx.doi.org/10.32747/2009.7296842.aphis.
Full textFinancial Stability Report - First Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.1sem.eng-2020.
Full textFinancial Stability Report - Second Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2020.
Full text