Добірка наукової літератури з теми "Security Profiles"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security Profiles".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Security Profiles":

1

Burton, Donna L. "U.S. national security policy groups: Institutional profiles." Government Information Quarterly 9, no. 2 (January 1992): 219–20. http://dx.doi.org/10.1016/0740-624x(92)90063-r.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Meister, Marcia. "U.S. national security policy groups: Institutional profiles." Government Publications Review 18, no. 4 (July 1991): 412–13. http://dx.doi.org/10.1016/0277-9390(91)90046-z.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gupta, Mukul, Jackie Rees, Alok Chaturvedi, and Jie Chi. "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach." Decision Support Systems 41, no. 3 (March 2006): 592–603. http://dx.doi.org/10.1016/j.dss.2004.06.004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Malathy, A., T. A. Vijayalakshmi, V. Kumar, I. Rajesh, and M. Banuchitra. "Security Profiles With Fine-Grained Policies On Smartphone." i-manager's Journal on Mobile Applications and Technologies 1, no. 4 (January 15, 2015): 39–43. http://dx.doi.org/10.26634/jmt.1.4.3520.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Zhauniarovich, Yury, Giovanni Russello, Mauro Conti, Bruno Crispo, and Earlence Fernandes. "MOSES: Supporting and Enforcing Security Profiles on Smartphones." IEEE Transactions on Dependable and Secure Computing 11, no. 3 (May 2014): 211–23. http://dx.doi.org/10.1109/tdsc.2014.2300482.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

MacLean, L. C., and W. T. Ziemba. "Growth-security profiles in capital accumulation under risk." Annals of Operations Research 31, no. 1 (December 1991): 501–9. http://dx.doi.org/10.1007/bf02204866.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Siu, B. W. M., C. C. Y. Au-Yeung, A. W. L. Chan, L. S. Y. Chan, K. K. Yuen, H. W. Leung, C. K. Yan, et al. "Validation of the “Security Needs Assessment Profile” for measuring the profiles of security needs of Chinese forensic psychiatric inpatients." International Journal of Law and Psychiatry 54 (September 2017): 61–66. http://dx.doi.org/10.1016/j.ijlp.2017.05.001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Buchyk, Serhii, Oleksandr Yudin, and Ruslan Netrebko. "IMPLEMENTATION OF GROUP DETERMINATION OF FUNCTIONAL PROFILE OF SECURITY AND LEVEL OF GUARANTEES OF INFORMATION AND TELECOMMUNICATION SYSTEM AGAINST UNAUTHORIZED ACCESS." Information systems and technologies security, no. 1 (1) (2019): 11–18. http://dx.doi.org/10.17721/ists.2019.1.11-18.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article proposes, shows and analyzes the main stages of implementing software for group assessment of a functional profile and determining or agreeing the level of guarantees for the correct implementation of functional security services in information security tools of information of telecommunication systems from unauthorized access in Ukraine based on theoretical studies previously conducted. The necessary regulatory documents on technical protection of information governing the procedure of evaluating and determining the level of guarantees of automated systems against unauthorized access in Ukraine are covered. The program was designed using the Data Flow Diagram, namely, a contextual diagram of the group definition process and a decomposed diagram of the process of group determination of the functional security profiles and the level of guarantees. More detailed flowcharts of software and algorithms are constructed. A prototype of the software is implemented; examples of work on each of the main blocks of work that were previously designed in the diagrams and flowcharts of the algorithms are given. Certain advantages and disadvantages of the developed software for group determination of the functional security profile and the level of guarantees are defined. The developed program allows to carry out group estimation and to compare the results sent to the server. This approach reduces the time spent by the security administrator to determine the security profiles and security levels of the information being processed against unauthorized access and to detect whether a specified functional profile coincides with a standard one (provided this match the user is provided with information about that standard functional profile) or determine another level of warranty. By conducting a group examination, the reliability of the obtained results increases
9

Matheu, Sara N., Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. "Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems." Sensors 20, no. 7 (March 28, 2020): 1882. http://dx.doi.org/10.3390/s20071882.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Despite the advantages that the Internet of Things (IoT) will bring to our daily life, the increasing interconnectivity, as well as the amount and sensitivity of data, make IoT devices an attractive target for attackers. To address this issue, the recent Manufacturer Usage Description (MUD) standard has been proposed to describe network access control policies in the manufacturing phase to protect the device during its operation by restricting its communications. In this paper, we define an architecture and process to obtain and enforce the MUD restrictions during the bootstrapping of a device. Furthermore, we extend the MUD model with a flexible policy language to express additional aspects, such as data privacy, channel protection, and resource authorization. For the enforcement of such enriched behavioral profiles, we make use of Software Defined Networking (SDN) techniques, as well as an attribute-based access control approach by using authorization credentials and encryption techniques. These techniques are used to protect devices’ data, which are shared through a blockchain platform. The resulting approach was implemented and evaluated in a real scenario, and is intended to reduce the attack surface of IoT deployments by restricting devices’ communication before they join a certain network.
10

van der Haar, Helen, and Rossouw von Solms. "A model for deriving information security control attribute profiles." Computers & Security 22, no. 3 (April 2003): 233–44. http://dx.doi.org/10.1016/s0167-4048(03)00311-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Security Profiles":

1

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
2

Hussein, Nesrin. "Enhancing Software Security through Modeling Attacker Profiles." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kula, Michal Damian. "Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86513.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Honeypots have been implemented in network security for years now, from the simplesystems where they could only mimic one vulnerable service and gather information aboutan intruder they have morphed in to advanced and complicated environments.Unfortunately, hackers have not left that untouched, and constantly try to detect honeypotsbefore being caught. This ongoing battle can be damaging to unexperienced internet users,who have no idea about securing devices in their small home-based network environment.The purpose of this research is to perform a technical study using IoT devices placed in a homeenvironment in a specially separated segment, and capture traffic between them and externalagents. This data is then analysed and used to build risk profiles of tested IoT devices aimingto provide security recommendations.The results indicate creating risk profiles for IoT devices could be used to gather more preciseinformation about external attacks and provide instant answer to what type of attacks couldbe generated against a selected IoT device. More development would be required to improvethis process, this includes redesign of the network and an automatic software-based toolcapable of generating risk profiles.
4

Namli, Tuncay. "Security, Privacy, Identity And Patient Consent Management Across Healthcare Enterprises Inintegrated Healthcare Enterprises (ihe) Cross Enterprise Document Sharing (xds) Affinity Domain." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608463/index.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Integrated Healthcare Enterprise (IHE) is an initiative by industry and healthcare professionals to improve knowledge sharing and interoperability between healthcare related enterprises. IHE publishes Integration Profiles on several Healthcare Fields to define how systems can use existing standards and technologies to execute a specific use case in healthcare. Cross Enterprise Document Sharing (XDS) is such a profile which defines the way of sharing Electronic Health Records (EHR) between healthcare enterprises. In this thesis, IHE Cross Enterprise User Authentication, IHE Node Authentication and Audit Trail, IHE Basic Patient Privacy Consent profiles are implemented based on the IHE XDSimplementation by National Institute of Standards, USA. Furthermore, some of the unspecified issues related with these profiles are clarified and new techniques are offered for their implementations. One of the contribution of the thesis is to use OASIS Extensible Access Control Markup Language (XACML) to define patient consent policies and manage access control. Other technologies and standards that are used in the implementation are as follows
OASIS Security Assertion Markup Language (SAML), XML Signature, Mutual Transport Layer Security (TLS), RFC 3195 Reliable Delivery for Syslog, RFC 3881 Security Audit and Access Accountability Message XML Data Definitions.
5

Olunuga, Adetunji A. "Profile Analysis of Mobile Application Security." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/835.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT This thesis conducts profile analysis on the mobile application security using peer-review articles that were published from 2010 to 2018. From the analysis, we will identify prolific authors, intuitions, and geographic regions as well as the topics addressed by the articles. The profile analysis will reveal most frequently used research methods, research approaches (quantitative, qualitative and mixed), and theories used to study the field. This thesis reveals that none of the researchers have made significant contributions to the field, and researches are not collaborating to solve their research problems. The profile analysis shows that surveys and experiments are the most utilized research methods, and most researchers studied the field at a higher level, i.e., security was the focus of the research but did not go deeper into various aspects of security such as privacy, security vulnerabilities, and mobile application security best practices.
6

Cheong, Chi Po. "Participant Domain Name Token Profile for security enhancements supporting service oriented architecture." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/49364/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This research proposes a new secure token profile for improving the existing Web Services security standards. It provides a new authentication mechanism. This additional level of security is important for the Service-Oriented Architecture (SOA), which is an architectural style that uses a set of principles and design rules to shape interacting applications and maintain interoperability. Currently, the market push is towards SOA, which provides several advantages, for instance: integration with heterogeneous systems, services reuse, standardization of data exchange, etc. Web Services is one of the technologies to implement SOA and it can be implemented using Simple Object Access Protocol (SOAP). A SOAP-based Web Service relies on XML for its message format and common application layer protocols for message negotiation and transmission. However, it is a security challenge when a message is transmitted over the network, especially on the Internet. The Organization for Advancement of Structured Information Standards (OASIS) announced a set of Web Services Security standards that focus on two major areas. “Who” can use the Web Service and “What” are the permissions. However, the location or domain of the message sender is not authenticated. Therefore, a new secure token profile called: Participant Domain Name Token Profile (PDNT) is created to tackle this issue. The PDNT provides a new security feature, which the existing token profiles do not address. Location-based authentication is achieved if adopting the PDNT when using Web Services. In the performance evaluation, PDNT is demonstrated to be significantly faster than other secure token profiles. The processing overhead of using the PDNT with other secure token profiles is very small given the additional security provided. Therefore all the participants can acquire the benefits of increased security and performance at low cost.
7

Silva, Luís Fernando Santos Corrêa da. "Percursos desiguais : trajetórias ocupacionais dos trabalhadores no setor de telecomunicações no período pós-privatização." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2011. http://hdl.handle.net/10183/29397.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Este estudo aborda as trajetórias ocupacionais dos trabalhadores de um segmento de mercado profundamente afetado, desde meados da década de 1990, por transformações tecnológicas, institucionais e organizacionais: o setor de telecomunicações no período pós-privatização no Brasil. Em termos teóricos, as perspectivas que permitem interface com o tema das trajetórias ocupacionais de trabalhadores têm discutido quais são as possibilidades de se promover segurança no mercado de trabalho ao trabalhador, tendo em vista que há, na atualidade, uma maior heterogeneidade nas situações de emprego e tendência de fragmentação das categoriais sócio-ocupacionais antes homogêneas. Mediante a análise longitudinal do mercado de trabalho do setor de telecomunicações, foi realizada a reconstituição das trajetórias ocupacionais de duas coortes de trabalhadores: a) primeiro período pós-privatização, coorte de 1998 (trajetória de 1998 a 2002); b) segundo período pós-privatização, coorte de 2003 (trajetória de 2003 a 2007). Para tanto, foram utilizados dados agregados disponíveis nas Bases RAIS e RAIS Migra, do Ministério do Trabalho e Emprego do Brasil. Em síntese, foi possível concluir que a passagem do primeiro período pós-privatização, marcado por reestruturação tecnológica e gerencial, para o segundo período pós-privatização, caracterizado por maior concorrência inter-empresarial, resultou em índices mais elevados de permanência no mercado de trabalho do setor de telecomunicações e no mercado de trabalho formal. Entretanto, padrões de desigualdades entre os perfis sócio-ocupacionais se mantiveram presentes, aprofundando-se no segundo período no que tange à permanência no mercado de trabalho do setor de telecomunicações e reduzindo-se no que diz respeito à permanência no mercado de trabalho formal. O aspecto que perpassa os dois períodos pós-privatização analisados sustenta-se no fato de que os níveis mais elevados de segurança no mercado de trabalho foram observados entre os trabalhadores que supostamente encontram-se em melhores condições de lidar com as oscilações do mercado de trabalho, ou seja, jovens, com remuneração e escolaridade elevadas, inseridos em ocupações situadas no topo da estrutura ocupacional do setor e possuidores de qualificação valorizada no mercado de trabalho formal como um todo.
This study approaches the occupational paths of workers in a market segment deeply affected, since the mid-1990s, by technological, institutional and organizational changes: the telecommunications sector in the post-privatization in Brazil. In theoretical terms, the perspectives that allows interface with the theme of the occupational paths of workers have discussed what the possibilities to promote security in the job market to workers, in view of that currently a greater heterogeneity in employment situations and propensity to fragment the socio-occupational classes, that was homogeneous before. By means of the longitudinal analysis of the job market in the telecommunications sector, a reconstitution of the occupational paths of two cohorts of workers was performed, to identify their levels of security in the job market: a) the first post-privatization period, cohort of 1998 (history from 1998 to 2002); b) the second post-privatization period, cohort of 2003 (history from 2003 to 2007). For that purpose, aggregated data bases available in RAIS and RAIS Migra of the Brazilian Ministry of Labor and Employment were used. In summary, the conclusion drawn here is that the passing of the first post-privatization period, marked by technological and managerial reorganization, for the second post-privatization period, characterized by greater inter-firm competition, resulted in higher abidance rates on the job market telecommunication sector and the formal job market. However, patterns of inequality between socio-occupational profiles remained present, going deep into the second period when it comes to staying in the job market of the telecommunications sector and decreasing in respect to staying in the formal job market. The aspect that crosses the two analyzed periods post-privatization is sustained in the fact that the highest levels of security in the job market have been observed among workers who supposedly are better able to cope with oscillations in the labor market, in other words, young workers, with high pay and education, placed in jobs on the top of the occupational structure of the sector and possessors of qualification valued in the formal job market as a whole.
8

Ullah, Abrar. "Security and usability of authentication by challenge questions in online examination." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/18186.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student's profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats. The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual's personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study.
9

Yeung, Ping E. "Belief-revisions after earnings announcements : evidence from security analysts' forecast revisions /." view abstract or download file of text, 2003. http://wwwlib.umi.com/cr/uoregon/fullcit?p3095287.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ph. D.)--University of Oregon, 2003.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 77-82). Also available for download via the World Wide Web; free to University of Oregon users.
10

Polák, Michael Adam. "Identifikace zařízení na základě jejich chování v síti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417243.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Táto práca sa zaoberá problematikou identifikácie sieťových zariadení na základe ich chovania v sieti. S neustále sa zvyšujúcim počtom zariadení na sieti je neustále dôležitejšia schopnosť identifikovať zariadenia z bezpečnostných dôvodov. Táto práca ďalej pojednáva o základoch počítačových sietí a metódach, ktoré boli využívané v minulosti na identifikáciu sieťových zariadení. Následne sú popísané algoritmy využívané v strojovom učení a taktiež sú popísané ich výhody i nevýhody. Nakoniec, táto práca otestuje dva tradičné algorithmy strojového učenia a navrhuje dva nové prístupy na identifikáciu sieťových zariadení. Výsledný navrhovaný algoritmus v tejto práci dosahuje 89% presnosť identifikácii sieťových zariadení na reálnej dátovej sade s viac ako 10000 zariadeniami.

Книги з теми "Security Profiles":

1

Watson, Cynthia Ann. U.S. national security policy groups: Institutional profiles. New York: Greenwood Press, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Stoneburner, Gary. CSPP: Guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hadburg, Bruce P. The EDA vendor directory: 55 turnkey and software vendor profiles. Saratoga, Calif: Electronic Trend Publications, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Knochel, Mary. Prison profiles: Classification of prisoners and prisons in Indiana. [Philadelphia]: Xlibris Corp., 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Epstein, Larry G. Uncertainty, risk-neutral measures and security price booms and crashes. Toronto: Dept. of Economics and Institute for Policy Analysis, University of Toronto, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

United States. General Accounting Office. General Government Division. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

United States. General Accounting Office. General Government Division. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Division, United States General Accounting Office General Government. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chowdhry, Dharam Paul. Profile of social welfare and development in India. New Delhi: M.N. Publishers & Distributors, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Chandramouli, Ramaswamy. Admission, discharge, and transfer system protection profile (ADT-PP): (an ISO.IEC 15408 security protection profile for a healthcare IT application system). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Security Profiles":

1

Siriwardena, Prabath. "OAuth 2.0 Profiles." In Advanced API Security, 211–26. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-2050-4_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Siriwardena, Prabath. "OAuth 2.0 Profiles." In Advanced API Security, 143–53. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Günther, Felix, Mark Manulis, and Thorsten Strufe. "Cryptographic Treatment of Private User Profiles." In Financial Cryptography and Data Security, 40–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Pottas, D., and SH von Solms. "Aligning Information Security Profiles With Organizational Policies." In IFIP Advances in Information and Communication Technology, 477–91. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34873-5_36.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Kavallieros, Dimitrios, Georgios Germanos, and Nicholas Kolokotronis. "Profiles of Cyber-Attackers and Attacks." In Cyber-Security Threats, Actors, and Dynamic Mitigation, 1–26. Boca Raton: CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Rocchetto, Marco, and Nils Ole Tippenhauer. "On Attacker Models and Profiles for Cyber-Physical Systems." In Computer Security – ESORICS 2016, 427–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Bilogrevic, Igor, Julien Freudiger, Emiliano De Cristofaro, and Ersin Uzun. "What’s the Gist? Privacy-Preserving Aggregation of User Profiles." In Computer Security - ESORICS 2014, 128–45. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Locasto, Michael E., Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, and Salvatore J. Stolfo. "Return Value Predictability Profiles for Self–healing." In Advances in Information and Computer Security, 152–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89598-5_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Marceau, Carla, and Matt Stillerman. "Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)." In Information and Communications Security, 369–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11935308_26.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Puzis, Rami, and Yuval Elovici. "Active Discovery of Hidden Profiles in Social Networks Using Malware." In Advances in Information Security, 221–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Security Profiles":

1

Gimmestad, Gary G., David A. Roberts, John M. Stewart, and Jack W. Wood. "Lidar system for monitoring turbulence profiles." In Defense and Security Symposium, edited by Cynthia Y. Young and G. Charmaine Gilbreath. SPIE, 2007. http://dx.doi.org/10.1117/12.720805.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Moldow, Roberta L., Michael T. Bergen, Kari Belin, Luba Bululu, Olivita Couso, Joselyn McLaughlin, Kenneth R. Short, and Richard J. Servatius. "Developing psychophysiological profiles for monitoring stress." In Defense and Security Symposium, edited by Glenn T. Shwaery, John G. Blitch, and Carlton Land. SPIE, 2006. http://dx.doi.org/10.1117/12.665964.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Kern, Joshua V., John B. Ferris, David Gorsich, and Alexander A. Reid. "Characterizing 2D road profiles using ARIMA modeling techniques." In Defense and Security Symposium, edited by Kevin Schum and Dawn A. Trevisani. SPIE, 2007. http://dx.doi.org/10.1117/12.720088.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Priddy, Jody D., Randolph A. Jones, Burhman Q. Gates, Jr., and Josh R. Fairley. "Establishing UGV power requirements based on mission profiles." In Defense and Security Symposium, edited by Grant R. Gerhart, Charles M. Shoemaker, and Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.666289.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gimmestad, Gary G., David W. Roberts, John M. Stewart, Jack W. Wood, and Frank D. Eaton. "Testing of LIDAR system for turbulence profiles." In SPIE Defense and Security Symposium, edited by G. Charmaine Gilbreath and Linda M. Wasiczko. SPIE, 2008. http://dx.doi.org/10.1117/12.792204.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Keller, John C. "Pursuit profiles: does the technology fit?" In Enabling Technologies for Law Enforcement and Security, edited by John B. Alexander, Debra D. Spencer, Steve Schmit, and Basil J. Steele. SPIE, 1997. http://dx.doi.org/10.1117/12.265420.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Meyer, Ron. "Coherent source transverse field profiles and far-field energy distribution." In SPIE Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2012. http://dx.doi.org/10.1117/12.978654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Koudelka, Melissa L., John A. Richards, and Mark W. Koch. "Multinomial pattern matching for high range resolution radar profiles." In Defense and Security Symposium, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2007. http://dx.doi.org/10.1117/12.720873.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Balozian, Puzant, and Dorothy Leidner. "The Assumptions and Profiles Behind IT Security Behavior." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.605.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zamfirescu, Raisa-Gabriela, Cosima Rughinis, Alexandra Hosszu, and Darie Cristea. "Cyber-Security Profiles of European Users: A Survey." In 2019 22nd International Conference on Control Systems and Computer Science (CSCS). IEEE, 2019. http://dx.doi.org/10.1109/cscs.2019.00080.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Security Profiles":

1

Stoneburner, Gary. CSPP - guidance for COTS security protection profiles, (formerly:. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Fossati, T. Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. Edited by H. Tschofenig. RFC Editor, July 2016. http://dx.doi.org/10.17487/rfc7925.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Howlett, J., and S. Hartman. A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML). Edited by A. Perez-Mendez. RFC Editor, May 2016. http://dx.doi.org/10.17487/rfc7833.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Fang, L., B. Niven-Jenkins, S. Mansfield, and R. Graveman, eds. MPLS Transport Profile (MPLS-TP) Security Framework. RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6941.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Tessin, T. SPI/UNIX user manual: Security Profile Inspector. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6845654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Burgin, K., and M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, October 2011. http://dx.doi.org/10.17487/rfc6380.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Salter, M., and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, January 2012. http://dx.doi.org/10.17487/rfc6460.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Salter, M., E. Rescorla, and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5430.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Stoneburner, Gary. COTS security protection profile-operating systems (CSPP-OS) :. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6985.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zhang, Pengchu C., and Nancy Ann Durgin. Profile-based adaptive anomaly detection for network security. Office of Scientific and Technical Information (OSTI), November 2005. http://dx.doi.org/10.2172/875979.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

До бібліографії