Academic literature on the topic 'Security Monitors'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Monitors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Monitors"

1

Chevalier, Yannick, and Michaël Rusinowitch. "Implementing Security Protocol Monitors." Electronic Proceedings in Theoretical Computer Science 342 (September 6, 2021): 22–34. http://dx.doi.org/10.4204/eptcs.342.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Badger, L. "Information security: from reference monitors to wrappers." IEEE Aerospace and Electronic Systems Magazine 13, no. 3 (March 1998): 32–33. http://dx.doi.org/10.1109/62.659861.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Narasimhan, Seetharam, Wen Yueh, Xinmu Wang, Saibal Mukhopadhyay, and Swarup Bhunia. "Improving IC Security Against Trojan Attacks Through Integration of Security Monitors." IEEE Design & Test of Computers 29, no. 5 (October 2012): 37–46. http://dx.doi.org/10.1109/mdt.2012.2210183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Magazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly inlining of dynamic security monitors." Computers & Security 31, no. 7 (October 2012): 827–43. http://dx.doi.org/10.1016/j.cose.2011.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Woods, David, Stephanie McNee, James W. Davis, Alexander Morison, Patrick Maughan, and Klaus Christoffersen. "Event Template Hierarchies as Means for Human-Automation Collaboration in Security Surveillance." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, no. 3 (September 2005): 302–6. http://dx.doi.org/10.1177/154193120504900319.

Full text
Abstract:
Advances in remote sensing systems provide human monitors access to more data. The current challenge is to help extract relevant patterns and direct the attention of human monitors and human problem holders to the changing security picture with respect to acute situations (a normal market scene turns into an ethnic confrontation) or longer term trends (seeing new patterns of 'typical' behavior to avoid false alarms). Security surveillance monitoring can be advanced through new event recognition capability of autonomous monitors and by effectively coupling these sensor/algorithm systems to human monitors and problem holders. To meet these challenges in security surveillance, we have developed an event-sensitivea rchitecturew here machine agents provide event-basedi nformationt o human monitors and problem holders and are re-directable given contextual information. The key innovation is a context-based hierarchical event template structure which can be used to integrate data over a distributed sensor system.
APA, Harvard, Vancouver, ISO, and other styles
6

Deyglun, C. "Testing and performances of Spectroscopic Radiation Portal Monitor for homeland security." EPJ Web of Conferences 225 (2020): 07008. http://dx.doi.org/10.1051/epjconf/202022507008.

Full text
Abstract:
Each year States report to IAEA loss, theft or out of regulatory control radioactive materials. Most incidents are minor, but material is potentially available for criminal acts. Measures to reduce the radiological and nuclear threat are many-faceted. An important component is the ability to detect illicit transport of radioactive material. Spectroscopic Radiation Portal Monitors are deployed around the world to detect illegal radioactive material traffic. A combination of experimental data collected during testing campaigns and simulations is a good way to study the performance of Spectroscopic Radiation Portal Monitors in realistic conditions. The paper presents a process to evaluate the performances of a portal, based on a combination of experimental data and MCNP simulations to calculate the detection probability and the false alarm rate. IRSN developed platforms for testing Spectroscopic Radiation Portal Monitors for pedestrian control. Experimental data were collected from an available commercial Spectroscopic Radiation Portal Monitor, tested in the framework of the Illicit Trafficking Radiation Assessment Program phase II Round Robin Test. Many scenarios were tested with different sources using realistic setups and many experimental data were collected. The tested equipment was then simulated with MCNP only based on the data provided in the user manual and the standards found in the industry. To get a realistic idea of the uncertainty, all the variables inherent in the measurement were considered, their relative contributions were identified and quantified, then propagated to predict an overall uncertainty. The combination of experimental data, numerical simulations and uncertainty evaluation showed good agreement with experimental assays. The results were used to test the sensitivity of a Spectroscopic Radiation Portal Monitor to special nuclear materials for different alarm thresholds. This process applied to different scenarios according to defined targets should help in the selection of operating characteristics of the portal.
APA, Harvard, Vancouver, ISO, and other styles
7

Albeshri, Aiiad, and Vijey Thayananthan. "Analytical Techniques for Decision Making on Information Security for Big Data Breaches." International Journal of Information Technology & Decision Making 17, no. 02 (March 2018): 527–45. http://dx.doi.org/10.1142/s0219622017500432.

Full text
Abstract:
In the big data processes, management and analytics are primary areas where we can introduce the decision making on information security to mitigate the big data breaches. According to the growing number of online systems and big data handling, mitigating the big data breaches is the serious problem during the processing period which needs to be monitored using appropriate technique. The goal of this research is to prevent the big data breaches using correct decision making based on information security concepts such as access control with authentication which depend on the management policies. The analytical approach of information security solution can also be useful for securing the big data infrastructure and key management that improve the big data breaches. As an analytical method, information security which focuses on detecting and securing the big data breaches is considered with access control. Here, we have introduced the multi-priority model influenced with the network calculus and access control which monitors the breaches during the big data processing. In the results and analysis, we can provide a graph which shows the monitoring improvement for decision making during the mitigation of big data breaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Freysdóttir, Gerður Rán, Kristín Björnsdóttir, and Margrét Hrönn Svavarsdóttir. "Nurses’ use of monitors in patient surveillance: an ethnographic study on a coronary care unit." European Journal of Cardiovascular Nursing 18, no. 4 (November 30, 2018): 272–79. http://dx.doi.org/10.1177/1474515118816930.

Full text
Abstract:
Background: Physiological monitors are increasingly used for patient surveillance. Although nurses play a vital role in the observation, analysis and use of information obtained from these devices, difficulties in their use, coupled with the high frequency of false and nuisance monitor alarms, can lead to negative working conditions and threaten patient safety. Aim: With the purpose of promoting effective monitor use and ensuring patient safety, the aim was to explore both how cardiovascular nurses use monitors in patient surveillance and the effect that the monitors have on the nurses’ work. Methods: A qualitative ethnographic design with semi-structured interviews and a field observation conducted at a 35-bed coronary care unit. A purposive sample was used in selecting participants. Data were analysed using systematic text condensation. Results: Eight registered nurses, all women, aged 27–49 years, were participants. The themes helping device, competence development and distractions and strain reflected both the knowledge on which the nurses drew in working with monitors and their influence on the nurses’ work. False security and collaboration and teamwork discussed how the nurses trust and depend on each other during monitor surveillance and how poor work conditions and unclear responsibility undermine surveillance. Conclusions: Monitors enable nurses to observe critically ill cardiac patients closely and respond quickly to life-threatening changes in their condition. Current work arrangements and limited training diminish the reliability of monitor surveillance. It is imperative to revise the structure of the surveillance and improve education in monitor surveillance to enhance nurses’ clinical competence and patients’ safety.
APA, Harvard, Vancouver, ISO, and other styles
9

Karger, Paul A., and David R. Safford. "I/O for Virtual Machine Monitors: Security and Performance Issues." IEEE Security & Privacy Magazine 6, no. 5 (September 2008): 16–23. http://dx.doi.org/10.1109/msp.2008.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khoury, Raphaël, and Nadia Tawbi. "Which security policies are enforceable by runtime monitors? A survey." Computer Science Review 6, no. 1 (January 2012): 27–45. http://dx.doi.org/10.1016/j.cosrev.2012.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security Monitors"

1

Khoury, Raphaël. "Enforcing Security Policies with Runtime Monitors." Thesis, Université Laval, 2011. http://www.theses.ulaval.ca/2011/28124/28124.pdf.

Full text
Abstract:
Le monitorage (monitoring) est une approche pour la sécurisation du code qui permet l'exécution d’un code potentiellement malicieux en observant son exécution, et en intervenant au besoin pour éviter une violation d’une politique de sécurité. Cette méthode a plusieurs applications prometteuses, notamment en ce qui a trait à la sécurisation du code mobile. Les recherches académiques sur le monitorage se sont généralement concentrées sur deux questions. La première est celle de délimiter le champ des politiques de sécurité applicables par des moniteurs opérant sous différentes contraintes. La seconde question est de construire des méthodes permettant d’insérer un moniteur dans un programme, ce qui produit un nouveau programme instrumenté qui respecte la politique de sécurité appliquée par ce moniteur. Mais malgré le fait qu’une vaste gamme de moniteurs a été étudiée dans la littérature, les travaux sur l’insertion des moniteurs dans les programmes se sont limités à une classe particulière de moniteurs, qui sont parmi les plus simples et les plus restreint quant à leur champ de politiques applicables. Cette thèse étend les deux avenues de recherches mentionnées précédemment et apporte un éclairage nouveau à ces questions. Elle s’attarde en premier lieu à étendre le champ des politiques applicables par monitorage en développabt une nouvelle approche pour l’insertion d’un moniteur dans un programme. En donnant au moniteur accès à un modèle du comportement du programme, l’étude montre que le moniteur acquiert la capacité d’appliquer une plus vaste gamme de politiques de sécurité. De plus, les recherches ont aussi d´emontré qu’un moniteur capable de transformer l’exécution qu’il surveille est plus puissant qu’un moniteur qui ne possède pas cette capacité. Naturellement, des contraintes doivent être imposées sur cette capacité pour que l’application de la politique soit cohérente. Autrement, si aucune restriction n’est imposée au moniteur, n’importe quelle politique devient applicable, mais non d’une manière utile ou désirable. Dans cette étude, nous proposons deux nouveaux paradigmes d’application des politiques de sécurité qui permettent d’incorporer des restrictions raisonnables imposées sur la capacité des moniteurs de transformer les exécutions sous leur contrôle. Nous étudions le champ des politiques applicables avec ces paradigmes et donnons des exemples de politiques réelles qui peuvent être appliquées à l’aide de notre approche.
Execution monitoring is an approach that seeks to allow an untrusted code to run safely by observing its execution and reacting if need be to prevent a potential violation of a user-supplied security policy. This method has many promising applications, particularly with respect to the safe execution of mobile code. Academic research on monitoring has generally focused on two questions. The first, relates to the set of policies that can be enforced by monitors under various constraints and the conditions under which this set can be extended. The second question deals with the way to inline a monitor into an untrusted or potentially malicious program in order to produce a new instrumented program that provably respects the desired security policy. This study builds on the two strands of research mentioned above and brings new insights to this study. It seeks, in the first place, to increase the scope of monitorable properties by suggesting a new approach of monitor inlining. By drawing on an a priori model of the program’s possible behavior, we develop a monitor that can enforce a strictly larger set of security properties. Furthermore, longstanding research has showed that a monitor that is allowed to transform its input is more powerful than one lacking this ability. Naturally, this ability must be constrained for the enforcement to be meaningful. Otherwise, if the monitor is given too broad a leeway to transform valid and invalid sequences, any property can be enforced, but not in a way that is useful or desirable. In this study, we propose two new enforcement paradigms which capture reasonable restrictions on a monitor’s ability to alter its input. We study the set of properties enforceable if these enforcement paradigms are used and give examples of real-life security policies that can be enforced using our approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Shankaranarayanan, Bharath. "Assertion-Based Monitors for Run-time Security Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1626356515627044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.

Full text
Abstract:
There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot detect unknown attacks for which there is no signature available. Anomaly-based detection builds a profile of normal system behavior to detect known and unknown attacks as behavioral deviations. However, it has a drawback of a high false alarm rate. In this thesis, we describe our anomaly-based IDS designed for detecting intrusions in cryptographic and application-level protocols. Our system has several unique characteristics, such as the ability to monitor cryptographic protocols and application-level protocols embedded in encrypted sessions, a very lightweight monitoring process, and the ability to react to protocol misuse by modifying protocol response directly.
APA, Harvard, Vancouver, ISO, and other styles
4

Raja, Subashree. "Security Architecture and Dynamic Signal Selection for Post-Silicon Validation." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623241837129969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vermeulen, Hester. "A balanced food basket approach to monitor food affordability in South Africa." Thesis, University of Pretoria, 2020. http://hdl.handle.net/2263/73175.

Full text
Abstract:
The public health landscape in South Africa today is characterised by a double-burden of nutritional challenges. Under-nutrition is prevalent, as is evident from the high levels of childhood stunting that are reported. Deficiencies of micro-nutrients such as vitamin A and iron continue to be prevalent in children, females and vulnerable groups. Simultaneously overweight and obesity among adults and children together with an associated increase in the occurrence of non-communicable diseases (NCDs) such as diabetes and cardiovascular disease are increasing steadily to epidemic levels. With approximately 40% of the population living under the International Poverty Line and approximately a quarter of the population not able to obtain enough food to fulfil their daily energy needs, poverty and food insecurity are harsh realities in many South African households. The ability of a household to make healthy food choices is, among other factors, affected by food affordability. Food affordability is determined by household income relative to the cost of purchased food items. In recent years, food affordability in South Africa has been under increased pressure due to the following factors: household income-growth barely keeping track with inflation, rising unemployment, as well as high and ever increasing food prices. The pressure on lower income households is particularly profound, forcing such households to use about a third of total expenditure for food purchases. In this study, a multi-disciplinary approach was used (including principles of nutrition, economics and consumer behaviour sciences) to develop models to measure the cost and affordability of healthy eating in South Africa at a national level and on a socio-economically disaggregated basis. The healthy food basket model was primarily based on the South African Food-based Dietary Guidelines, typical food consumption patterns, household demographics and official urban retail food prices monitored by Statistics South Africa. Food affordability is a major challenge, with 60% of the population unable to afford the Moderate-cost Food Basket which provides greater nutritional diversity. The more economical Thrifty Healthy Food Basket (approximately 30% less expensive) is only affordable to approximately half of the South African population. A four member household earning two minimum wages has to spend a third of total expenditure on food to be able to afford this basket, while the typical food expenditure share of such households is usually lower (approximately 24%), thus confirming the pressure on households to afford healthy eating. In future the models of healthy eating also present possibilities for further expansion (e.g. these models can be refined to study different geographical areas or different household structure typologies). Compared to national nutritional recommendations, the study found that the intakes of whole-grain starch-rich foods, lean meat, fish, eggs, dairy, fruit, vegetables and legumes were low. Inadequate intake was generally more severe among lower income households. Less-affluent households spend a large proportion of their food budget on starch-rich staples, fats / oils and sugar-rich foods, but allocate insufficient resources to animal-source foods, legumes, fruit and vegetables. This study also identified that excessive intakes of refined and processed starch-rich food options, sugar-rich foods and fats / oils were common across all income groups and increased with socio-economic status. These findings confirm the reality of the nutrition transition in South Africa. The contribution of this research to estimate the socio-economically disaggregated consumption of animal-source foods (meat, fish and eggs) and starch-rich foods (maize meal, bread, rice and potatoes), provides valuable insights into differences in food intake across the socio-economic spectrum of South Africa. A complex combination of interventions is required to promote healthy eating patterns in South Africa. In addition to legislative measures (e.g. salt and sugar reduction legislation), consumer education (across the socio-economic spectrum) should focus on science-based practical solutions and provide advice on making healthy and budget-conscious food choices. In addition, it is also important to design and implement policy actions to improve the affordability and availability of healthy food options for the various socio-economic groups, in diverse geographic locations in South Africa. The improvement of food affordability is a key component in moving closer to achieve the Sustainable Development Goal of the United Nations “to end hunger, achieve food security, improve nutrition and promote sustainable agriculture”. Furthermore, improving household food and nutrition security (including addressing issues pertaining to healthy food consumption and affordability), through public and private sector actions, is one of the enabling milestones in the National Development Plan 2030. The monthly costing of the food basket models which were developed in this study and analyses thereof should be used as policy analysis tools to act as a practical, scientific basis for the food security debate in South Africa. These tools are, in fact, already published on a quarterly basis in the public domain. In future the models of healthy eating also present possibilities for further expansion (e.g. these models can be refined to study different geographical areas or different household structure typologies).
Thesis (PhD) - University of Pretoria. 2020.
Financial support received from: * The Bureau for Food and Agricultural Policy (BFAP) * The Department of Science and Technology (DST)/National Research Foundation (NRF) Centre of Excellence (CoE) in Food Security * Agbiz * Red Meat Research and Development South Africa (RMRD SA) * DST/NRF South African Research Chairs Initiative (SARChl) in the National Development Plan Priority Area of Nutrition and Food Security (Unique number: SARCI170808259212) * University of Pretoria
Animal and Wildlife Sciences
PhD Nutrition
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
6

Nauditt, Alexandra. "Understanding stream flow generation in sparsely monitored montane catchments." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=233935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Leon, Vidalon Igmar, and Ampuero Pablo Jorge Medina. "Mejora al Proceso de Monitoreo Continuo de Vulnerabilidades." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/652805.

Full text
Abstract:
El presente trabajo de investigación tiene como objetivo mejorar el proceso de Monitoreo Continuo de Vulnerabilidades de la gerencia de Operaciones de Seguridad Tecnológica lo cual contribuye en gran medida a estar prevenidos y mitigar en gran medida cualquier problema que pueda aprovechar una amenaza externa e interna de Mibanco. El presente trabajo de investigación contiene seis capítulos entre los principales la definición del Marco Teórico, se desarrollaron los principales conceptos, antecedentes y se definieron las palabras claves relacionadas al tema principal del presente trabajo de investigación; en el capítulo de Desarrollo del Proyecto se evidenciara el problema con más detalle donde se formula el problema principal y el objetivo de mejora el cual estaría enfocado en la reducción sustancial de tiempo con el apoyo de tecnologías de información.
This research work aims to improve the Continuous Vulnerability Monitoring process of Technology Security Operations management, which greatly contributes to being prevented and greatly mitigating any problem that may take advantage of an external and internal threat from Mibanco. This research work contains six chapters, the main ones being the definition of the Theoretical Framework, the main concepts, antecedents were developed and the key words related to the main topic of this research work were defined; In the Project Development chapter the problem will be shown in more detail where the main problem is formulated and the improvement objective which would be focused on the substantial reduction of time with the support of information technologies.
Tesis
APA, Harvard, Vancouver, ISO, and other styles
8

Lu, Lu. "IoT Network Watchdog." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34008.

Full text
Abstract:
The Internet of Things (IoT) plays an important role in the coming era of the Internet development. In addition to the convenience and opportunities it brings to us, there comes with the security issues, which could lead to the privacy leakage, it’s a threaten to the whole IoT system. To deal with the potential dangerous element hidden behind this technology, monitoring on the network would be indispensable. To develop and implements the digital network watchdog system that monitors the local network and the connected device, firstly, I surveyed the area related to the IoT attacks. The network monitor system provides basic network monitoring function, connected device tracking and monitoring function, reliable device operating function. I used the packages provided by Raspberry Pi to realize the general monitoring and transferred the captured result for further analysis. Also, I made use of SNMP and drawing tool to create graphs of different parameters in the monitoring of both network and connected devices. Then I implemented database with web service on Raspberry Pi to realize device operating. In evaluation, the system works well in general monitoring with all information provided and low lost package percentage, the graphs can provide situation of different parameters, and the respond time in the operation time of database is short. I discussed the ethical thinking and proposed the ethical thinking and future work.
APA, Harvard, Vancouver, ISO, and other styles
9

PASQUIER, JEAN-BAPTISTE. "Remote surveys to monitor IDPs leaving displacement sites : A case study in the eastern DR Congo." Thesis, KTH, Industriell ekologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-179640.

Full text
Abstract:
In the last 20 years, on-going conflicts in eastern Democratic Republic of Congo (DRC) and neighbouring countries have led to massive displacements. In the province of Nord-Kivu, epicentre of the crisis, there are currently 53 displacement sites that host about 185,000 Internally Displaced People (IDPs). IDPs tend to leave camps as soon as they consider their home villages to be safe. At the same time, camps are also being closed for political motivations, creating large flows of IDPs to unknown areas. The World Food Programme (WFP) and other humanitarian actors need to track returnees and understand their need for assistance. WFP conducts a monthly phone survey in Mugunga III, an IDP camp on the outskirts of Goma, the capital of Nord-Kivu. The main goal of this remote survey is to monitor the food security situation in the camp. However, this paper demonstrates that this innovative tool also proves successful in monitoring the situation of returnees and understanding the dynamics of their returns. This remote monitoring technology is expected to be even more useful when the authorities decide to close the camp. If the results are disseminated, an increase in government accountability should be observed. This research was conducted in collaboration with WFP in an attempt to extend the applications of high frequency survey data. To continue this research, methodological adjustments should be taken before considering applying the tool to another displacement site.
APA, Harvard, Vancouver, ISO, and other styles
10

Patzina, Lars Verfasser], Andy [Akademischer Betreuer] Schürr, and Jan [Akademischer Betreuer] [Jürjens. "Generierung von effizienten Security-/Safety-Monitoren aus modellbasierten Beschreibungen / Lars Patzina. Betreuer: Andy Schürr ; Jan Jürjens." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2014. http://d-nb.info/1110979053/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security Monitors"

1

United States. Congress. Commission on Security and Cooperation in Europe. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundredth Congress, first session, Helsinki monitors, October 22, 1987. Washington: U.S. G.P.O., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Congress. Commission on Security and Cooperation in Europe. Implementation of the Helsinki accords: Hearing before the Commission on Security and Cooperation in Europe, One Hundredth Congress, first session, Helsinki monitors, October 22, 1987. Washington: U.S. G.P.O., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Government Accountability Office. Combating nuclear smuggling: DNDO has not yet collected most of the national laboratories' test results on radiation portal monitors in support of DNDO's testing and development program. Washington, D.C. (441 G St. NW, Washington 20548): United States Government Accountability Office, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Davies, Simon. Monitor. Sydney: Pan Macmillan Australia, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nuclear smuggling detection: Recent tests of advanced spectroscopic portal monitors : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, March 5, 2008. Washington: U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sullivan, Mike. Safety monitor: How to protect your kids online. Chicago: Bonus Books, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Woodward, Melanie. Construction of a honeypot to monitor unauthorised systems access and the role of a honeypot as a part of a business security solution. Oxford: Oxford Brookes University, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United, States Congress Senate Committee on Banking Housing and Urban Affairs Subcommittee on Security and International Trade and Finance. Equipping financial regulators with the tools necessary to monitor systemic risk: Hearing before the Subcommittee on Security and International Trade and Finance of the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundred Eleventh Congress, second session, on examining the systemic risk aspect of regulatory reform, focusing on regulators' current capabilities to collect and analyze financial market data, and assessing what additional tools and resources are necessary to monitor and identify systemic risk, February 12, 2010. Washington: U.S. G.P.O., 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Automating security monitoring & analysis for Space Station Freedom's electric power system. [Washington, D.C.]: NASA, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Helfont, Samuel. Mechanisms of Control. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190843311.003.0011.

Full text
Abstract:
This chapter discusses the way in which the Ba’thist regime monitored and enforced boundaries on acceptable interpretations of religion in Iraq. The Ba’thists built on and expanded the instructions that it had developed during the first decade of Saddam Hussein’s presidency. The work of local committees became more thorough and systematic. Party bureaus and security services controlled who could work in the religious landscape as well as what they could say. Local branches of the Ba’th Party began keeping spreadsheets on every mosque and all religious leaders in their territories. They maintained and updated these spreadsheets through national “inventories” they conducted of the religious landscape. Iraqi intelligence and security services also updated their structures to better monitor and mitigate threats coming from religious actors; they were always on the lookout for ways to infiltrate various circles within the religious opposition by using spies.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security Monitors"

1

Ribeiro, Carlos, André Zúquete, and Paulo Ferreira. "Enforcing Obligation with Security Monitors." In Information and Communications Security, 172–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45600-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lemay, Frédérick, Raphaël Khoury, and Nadia Tawbi. "Optimized Inlining of Runtime Monitors." In Information Security Technology for Applications, 149–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29615-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schneider, Fred B. "Lifting Reference Monitors from the Kernel." In Formal Aspects of Security, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40981-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Testerink, Bas, Nils Bulling, and Mehdi Dastani. "Security and Robustness for Collaborative Monitors." In Lecture Notes in Computer Science, 376–95. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42691-4_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Wenhao, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, and Shuang Hao. "SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks." In Computer Security, 122–42. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ligatti, Jay, Lujo Bauer, and David Walker. "Enforcing Non-safety Security Policies with Program Monitors." In Computer Security – ESORICS 2005, 355–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11555827_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Falcone, Yliès, Jean-Claude Fernandez, and Laurent Mounier. "Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties." In Information Systems Security, 41–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89862-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, Lujo, Jarred Ligatti, and David Walker. "Types and Effects for Non-interfering Program Monitors." In Software Security — Theories and Systems, 154–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36532-x_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boyer, Kirk, Hao Chen, Jingwei Chen, Jian Qiu, and Rinku Dewri. "A Characterization of the Mass Surveillance Potential of Road Traffic Monitors." In Information Systems Security, 3–23. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05171-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Magazinius, Jonas, Alejandro Russo, and Andrei Sabelfeld. "On-the-fly Inlining of Dynamic Security Monitors." In Security and Privacy – Silver Linings in the Cloud, 173–86. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15257-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Monitors"

1

Khan, Muhammad Umair Ahmed, and Mohammad Zulkernine. "Building components with embedded security monitors." In the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2000259.2000282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

LeJeune, Keith, Jason Berberich, Jon Washburn, Markus Erbeldinger, and Jessica Sinclair. "Enzyme-polymer based environmental monitors." In SPIE Defense, Security, and Sensing, edited by Thomas George, M. Saif Islam, and Achyut K. Dutta. SPIE, 2010. http://dx.doi.org/10.1117/12.851063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McDermott, John, Bruce Montrose, Margery Li, James Kirby, and Myong Kang. "Separation virtual machine monitors." In the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2421011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shiva, Sajjan, Ramya Dharam, and Vivek Shandilya. "Runtime Monitors as Sensors of Security Systems." In Parallel and Distributed Computing and Systems. Calgary,AB,Canada: ACTAPRESS, 2011. http://dx.doi.org/10.2316/p.2011.757-027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shiva, Sajjan, Ramya Dharam, and Vivek Shandilya. "Runtime Monitors as Sensors of Security Systems." In Parallel and Distributed Computing and Systems. Calgary,AB,Canada: ACTAPRESS, 2012. http://dx.doi.org/10.2316/p.2012.757-027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cappos, Justin, and Richard Weiss. "Teaching the security mindset with reference monitors." In the 45th ACM technical symposium. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2538862.2538939.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Askarov, Aslan, Stephen Chong, and Heiko Mantel. "Hybrid Monitors for Concurrent Noninterference." In 2015 IEEE 28th Computer Security Foundations Symposium (CSF). IEEE, 2015. http://dx.doi.org/10.1109/csf.2015.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Assaf, Mounir, and David A. Naumann. "Calculational Design of Information Flow Monitors." In 2016 IEEE 29th Computer Security Foundations Symposium (CSF). IEEE, 2016. http://dx.doi.org/10.1109/csf.2016.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karlstedt, Tomi, Ville Leppänen, and Sanna Tuohimaa. "Embedding Rule-Based Security Monitors into Java Programs." In 2008 32nd Annual IEEE International Computer Software and Applications Conference. IEEE, 2008. http://dx.doi.org/10.1109/compsac.2008.150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amorim, Arthur Azevedo de, Maxime Denes, Nick Giannarakis, Catalin Hritcu, Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach. "Micro-Policies: Formally Verified, Tag-Based Security Monitors." In 2015 IEEE Symposium on Security and Privacy (SP). IEEE, 2015. http://dx.doi.org/10.1109/sp.2015.55.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security Monitors"

1

Reynolds, Patrick, Oliver Kennedy, Emin G. Sirer, and Fred B. Schneider. Securing BGP Using External Security Monitors. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada633655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Karam, Lisa R., Leticia Pibida, Michael P. Unterweger, and Larry L. Lucas. Gamma-ray emitting test sources for portal monitors used for homeland security. Gaithersburg, MD: National Bureau of Standards, 2004. http://dx.doi.org/10.6028/nist.tn.1460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heberlein, L. T., G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6223037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

John Svoboda. Transmission Line Security Monitor: Final Report. Office of Scientific and Technical Information (OSTI), April 2011. http://dx.doi.org/10.2172/1016198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Author, Not Given. Modification of Transmission Line Security Monitor Sensor Platform. Office of Scientific and Technical Information (OSTI), January 2011. http://dx.doi.org/10.2172/1010663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Irvine, Cynthia E. The Reference Monitor Concept as a Unifying Principle in Computer Security Education. Fort Belvoir, VA: Defense Technical Information Center, June 1999. http://dx.doi.org/10.21236/ada423529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Safeguarding through science: Center for Plant Health Science and Technology 2008 Accomplishments. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, December 2009. http://dx.doi.org/10.32747/2009.7296842.aphis.

Full text
Abstract:
The Center for Plant Health Science and Technology (CPHST) was designed and developed to support the regulatory decisions and operations of the Animal and Plant Health Inspection Service’s (APHIS) Plant Protection and Quarantine (PPQ) program through methods development work, scientific investigation, analyses, and technology—all in an effort to safeguard U.S. agriculture and natural resources. This 2008 CPHST Annual Report is intended to offer an in-depth look at the status of its programs and the progress it has made toward the Center’s long-term strategic goals. One of CPHST’s most significant efforts in 2008 was to initiate efforts to improve the Center’s organizational transparency and overall responsiveness to the needs of its stakeholders. As a result of its focus in this area, CPHST is now developing a new workflow process that allows the customers to easily request and monitor projects and ensures that the highest priority projects are funded for successful delivery. This new system will allow CPHST to more dynamically identify the needs of the agency, more effectively allocate and utilize resources, and provide its customers timely information regarding a project’s status. Thus far, while still very much a work in progress, this new process is proving to be successful, and will continue to advance and expand the service to its customers and staff. The considerable and growing concern of homeland security and the management of critical issues drives CPHST to lead the methods development of science-based systems for prevention, preparedness, response, and recovery. CPHST is recognized nationally and internationally for its leadership in scientific developments to battle plant pests and diseases.
APA, Harvard, Vancouver, ISO, and other styles
8

Financial Stability Report - First Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.1sem.eng-2020.

Full text
Abstract:
In the face of the multiple shocks currently experienced by the domestic economy (resulting from the drop in oil prices and the appearance of a global pandemic), the Colombian financial system is in a position of sound solvency and adequate liquidity. At the same time, credit quality has been recovering and the exposure of credit institutions to firms with currency mismatches has declined relative to previous episodes of sudden drops in oil prices. These trends are reflected in the recent fading of red and blue tonalities in the performance and credit risk segments of the risk heatmaps in Graphs A and B.1 Naturally, the sudden, unanticipated change in macroeconomic conditions has caused the appearance of vulnerabilities for short-term financial stability. These vulnerabilities require close and continuous monitoring on the part of economic authorities. The main vulnerability is the response of credit and credit risk to a potential, temporarily extreme macroeconomic situation in the context of: (i) recently increased exposure of some banks to household sector, and (ii) reductions in net interest income that have led to a decline in the profitability of the banking business in the recent past. Furthermore, as a consequence of greater uncertainty and risk aversion, occasional problems may arise in the distribution of liquidity between agents and financial markets. With regards to local markets, spikes have been registered in the volatility of public and private fixed income securities in recent weeks that are consistent with the behavior of the international markets and have had a significant impact on the liquidity of those instruments (red portions in the most recent past of some market risk items on the map in Graph A). In order to adopt a forward-looking approach to those vulnerabilities, this Report presents a stress test that evaluates the resilience of credit institutions in the event of a hypothetical scenario thatseeks to simulate an extreme version of current macroeconomic conditions. The scenario assumes a hypothetical negative growth that is temporarily strong but recovers going into the middle of the coming year and has extreme effects on credit quality. The results suggest that credit institutions have the ability to withstand a significant deterioration in economic conditions in the short term. Even though there could be a strong impact on credit, liquidity, and profitability under the scenario being considered, aggregate capital ratios would probably remain at above their regulatory limits over the horizon of a year. In this context, the recent measures taken by both Banco de la República and the Office of the Financial Superintendent of Colombia that are intended to help preserve the financial stability of the Colombian economy become highly relevant. In compliance with its constitutional objectives and in coordination with the financial system’s security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions that are necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth functioning of the payment system. Juan José Echavarría Governor
APA, Harvard, Vancouver, ISO, and other styles
9

Financial Stability Report - Second Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2020.

Full text
Abstract:
The Colombian financial system has not suffered major structural disruptions during these months of deep economic contraction and has continued to carry out its basic functions as usual, thus facilitating the economy's response to extreme conditions. This is the result of the soundness of financial institutions at the beginning of the crisis, which was reflected in high liquidity and capital adequacy indicators as well as in the timely response of various authorities. Banco de la República lowered its policy interest rates 250 points to 1.75%, the lowest level since the creation of the new independent bank in 1991, and provided ample temporary and permanent liquidity in both pesos and foreign currency. The Office of the Financial Superintendent of Colombia, in turn, adopted prudential measures to facilitate changes in the conditions for loans in effect and temporary rules for rating and loan-loss provisions. Finally, the national government expanded the transfers as well as the guaranteed credit programs for the economy. The supply of real credit (i.e. discounting inflation) in the economy is 4% higher today than it was 12 months ago with especially marked growth in the housing (5.6%) and commercial (4.7%) loan portfolios (2.3% in consumer and -0.1% in microloans), but there have been significant changes over time. During the first few months of the quarantine, firms increased their demands for liquidity sharply while consumers reduced theirs. Since then, the growth of credit to firms has tended to slow down, while consumer and housing credit has grown. The financial system has responded satisfactorily to the changes in the respective demands of each group or sector and loans may grow at high rates in 2021 if GDP grows at rates close to 4.6% as the technical staff at the Bank expects; but the forecasts are highly uncertain. After the strict quarantine implemented by authorities in Colombia, the turmoil seen in March and early April, which was evident in the sudden reddening of macroeconomic variables on the risk heatmap in Graph A,[1] and the drop in crude oil and coal prices (note the high volatility registered in market risk for the region on Graph A) the local financial markets stabilized relatively quickly. Banco de la República’s credible and sustained policy response played a decisive role in this stabilization in terms of liquidity provision through a sharp expansion of repo operations (and changes in amounts, terms, counterparties, and eligible instruments), the purchases of public and private debt, and the reduction in bank reserve requirements. In this respect, there is now abundant aggregate liquidity and significant improvements in the liquidity position of investment funds. In this context, the main vulnerability factor for financial stability in the short term is still the high degree of uncertainty surrounding loan quality. First, the future trajectory of the number of people infected and deceased by the virus and the possible need for additional health measures is uncertain. For that reason, there is also uncertainty about the path for economic recovery in the short and medium term. Second, the degree to which the current shock will be reflected in loan quality once the risk materializes in banks’ financial statements is uncertain. For the time being, the credit risk heatmap (Graph B) indicates that non-performing and risky loans have not shown major deterioration, but past experience indicates that periods of sharp economic slowdown eventually tend to coincide with rises in non-performing loans: the calculations included in this report suggest that the impact of the recession on credit quality could be significant in the short term. This is particularly worrying since the profitability of credit establishments has been declining in recent months, and this could affect their ability to provide credit to the real sector of the economy. In order to adopt a forward-looking approach to this vulnerability, this Report presents several stress tests that evaluate the resilience of the liquidity and capital adequacy of credit institutions and investment funds in the event of a hypothetical scenario that seeks to simulate an extreme version of current macroeconomic conditions. The results suggest that even though there could be strong impacts on the credit institutions’ volume of credit and profitability under such scenarios, aggregate indicators of total and core capital adequacy will probably remain at levels that are above the regulatory limits over the horizon of a year. At the same time, the exercises highlight the high capacity of the system's liquidity to face adverse scenarios. In compliance with its constitutional objectives and in coordination with the financial system's security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions that are necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth operation of the payment systems. Juan José Echavarría Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography