Добірка наукової літератури з теми "Security Profiles"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security Profiles".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security Profiles":
Burton, Donna L. "U.S. national security policy groups: Institutional profiles." Government Information Quarterly 9, no. 2 (January 1992): 219–20. http://dx.doi.org/10.1016/0740-624x(92)90063-r.
Meister, Marcia. "U.S. national security policy groups: Institutional profiles." Government Publications Review 18, no. 4 (July 1991): 412–13. http://dx.doi.org/10.1016/0277-9390(91)90046-z.
Gupta, Mukul, Jackie Rees, Alok Chaturvedi, and Jie Chi. "Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach." Decision Support Systems 41, no. 3 (March 2006): 592–603. http://dx.doi.org/10.1016/j.dss.2004.06.004.
Malathy, A., T. A. Vijayalakshmi, V. Kumar, I. Rajesh, and M. Banuchitra. "Security Profiles With Fine-Grained Policies On Smartphone." i-manager's Journal on Mobile Applications and Technologies 1, no. 4 (January 15, 2015): 39–43. http://dx.doi.org/10.26634/jmt.1.4.3520.
Zhauniarovich, Yury, Giovanni Russello, Mauro Conti, Bruno Crispo, and Earlence Fernandes. "MOSES: Supporting and Enforcing Security Profiles on Smartphones." IEEE Transactions on Dependable and Secure Computing 11, no. 3 (May 2014): 211–23. http://dx.doi.org/10.1109/tdsc.2014.2300482.
MacLean, L. C., and W. T. Ziemba. "Growth-security profiles in capital accumulation under risk." Annals of Operations Research 31, no. 1 (December 1991): 501–9. http://dx.doi.org/10.1007/bf02204866.
Siu, B. W. M., C. C. Y. Au-Yeung, A. W. L. Chan, L. S. Y. Chan, K. K. Yuen, H. W. Leung, C. K. Yan, et al. "Validation of the “Security Needs Assessment Profile” for measuring the profiles of security needs of Chinese forensic psychiatric inpatients." International Journal of Law and Psychiatry 54 (September 2017): 61–66. http://dx.doi.org/10.1016/j.ijlp.2017.05.001.
Buchyk, Serhii, Oleksandr Yudin, and Ruslan Netrebko. "IMPLEMENTATION OF GROUP DETERMINATION OF FUNCTIONAL PROFILE OF SECURITY AND LEVEL OF GUARANTEES OF INFORMATION AND TELECOMMUNICATION SYSTEM AGAINST UNAUTHORIZED ACCESS." Information systems and technologies security, no. 1 (1) (2019): 11–18. http://dx.doi.org/10.17721/ists.2019.1.11-18.
Matheu, Sara N., Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. "Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems." Sensors 20, no. 7 (March 28, 2020): 1882. http://dx.doi.org/10.3390/s20071882.
van der Haar, Helen, and Rossouw von Solms. "A model for deriving information security control attribute profiles." Computers & Security 22, no. 3 (April 2003): 233–44. http://dx.doi.org/10.1016/s0167-4048(03)00311-0.
Дисертації з теми "Security Profiles":
Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.
Hussein, Nesrin. "Enhancing Software Security through Modeling Attacker Profiles." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1523635219435409.
Kula, Michal Damian. "Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86513.
Namli, Tuncay. "Security, Privacy, Identity And Patient Consent Management Across Healthcare Enterprises Inintegrated Healthcare Enterprises (ihe) Cross Enterprise Document Sharing (xds) Affinity Domain." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608463/index.pdf.
OASIS Security Assertion Markup Language (SAML), XML Signature, Mutual Transport Layer Security (TLS), RFC 3195 Reliable Delivery for Syslog, RFC 3881 Security Audit and Access Accountability Message XML Data Definitions.
Olunuga, Adetunji A. "Profile Analysis of Mobile Application Security." UNF Digital Commons, 2018. https://digitalcommons.unf.edu/etd/835.
Cheong, Chi Po. "Participant Domain Name Token Profile for security enhancements supporting service oriented architecture." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/49364/.
Silva, Luís Fernando Santos Corrêa da. "Percursos desiguais : trajetórias ocupacionais dos trabalhadores no setor de telecomunicações no período pós-privatização." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2011. http://hdl.handle.net/10183/29397.
This study approaches the occupational paths of workers in a market segment deeply affected, since the mid-1990s, by technological, institutional and organizational changes: the telecommunications sector in the post-privatization in Brazil. In theoretical terms, the perspectives that allows interface with the theme of the occupational paths of workers have discussed what the possibilities to promote security in the job market to workers, in view of that currently a greater heterogeneity in employment situations and propensity to fragment the socio-occupational classes, that was homogeneous before. By means of the longitudinal analysis of the job market in the telecommunications sector, a reconstitution of the occupational paths of two cohorts of workers was performed, to identify their levels of security in the job market: a) the first post-privatization period, cohort of 1998 (history from 1998 to 2002); b) the second post-privatization period, cohort of 2003 (history from 2003 to 2007). For that purpose, aggregated data bases available in RAIS and RAIS Migra of the Brazilian Ministry of Labor and Employment were used. In summary, the conclusion drawn here is that the passing of the first post-privatization period, marked by technological and managerial reorganization, for the second post-privatization period, characterized by greater inter-firm competition, resulted in higher abidance rates on the job market telecommunication sector and the formal job market. However, patterns of inequality between socio-occupational profiles remained present, going deep into the second period when it comes to staying in the job market of the telecommunications sector and decreasing in respect to staying in the formal job market. The aspect that crosses the two analyzed periods post-privatization is sustained in the fact that the highest levels of security in the job market have been observed among workers who supposedly are better able to cope with oscillations in the labor market, in other words, young workers, with high pay and education, placed in jobs on the top of the occupational structure of the sector and possessors of qualification valued in the formal job market as a whole.
Ullah, Abrar. "Security and usability of authentication by challenge questions in online examination." Thesis, University of Hertfordshire, 2017. http://hdl.handle.net/2299/18186.
Yeung, Ping E. "Belief-revisions after earnings announcements : evidence from security analysts' forecast revisions /." view abstract or download file of text, 2003. http://wwwlib.umi.com/cr/uoregon/fullcit?p3095287.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 77-82). Also available for download via the World Wide Web; free to University of Oregon users.
Polák, Michael Adam. "Identifikace zařízení na základě jejich chování v síti." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417243.
Книги з теми "Security Profiles":
Watson, Cynthia Ann. U.S. national security policy groups: Institutional profiles. New York: Greenwood Press, 1990.
Stoneburner, Gary. CSPP: Guidance for COTS security protection profiles (formerly: CS2-- protection profile guidance for near-term COTS). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Hadburg, Bruce P. The EDA vendor directory: 55 turnkey and software vendor profiles. Saratoga, Calif: Electronic Trend Publications, 1990.
Knochel, Mary. Prison profiles: Classification of prisoners and prisons in Indiana. [Philadelphia]: Xlibris Corp., 2000.
Epstein, Larry G. Uncertainty, risk-neutral measures and security price booms and crashes. Toronto: Dept. of Economics and Institute for Policy Analysis, University of Toronto, 1994.
United States. General Accounting Office. General Government Division. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.
United States. General Accounting Office. General Government Division. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.
Division, United States General Accounting Office General Government. Workforce profile at SSA Baltimore. Washington, D.C: The Office, 1996.
Chowdhry, Dharam Paul. Profile of social welfare and development in India. New Delhi: M.N. Publishers & Distributors, 1985.
Chandramouli, Ramaswamy. Admission, discharge, and transfer system protection profile (ADT-PP): (an ISO.IEC 15408 security protection profile for a healthcare IT application system). Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2002.
Частини книг з теми "Security Profiles":
Siriwardena, Prabath. "OAuth 2.0 Profiles." In Advanced API Security, 211–26. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-2050-4_9.
Siriwardena, Prabath. "OAuth 2.0 Profiles." In Advanced API Security, 143–53. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8_9.
Günther, Felix, Mark Manulis, and Thorsten Strufe. "Cryptographic Treatment of Private User Profiles." In Financial Cryptography and Data Security, 40–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29889-9_5.
Pottas, D., and SH von Solms. "Aligning Information Security Profiles With Organizational Policies." In IFIP Advances in Information and Communication Technology, 477–91. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-0-387-34873-5_36.
Kavallieros, Dimitrios, Georgios Germanos, and Nicholas Kolokotronis. "Profiles of Cyber-Attackers and Attacks." In Cyber-Security Threats, Actors, and Dynamic Mitigation, 1–26. Boca Raton: CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006145-1.
Rocchetto, Marco, and Nils Ole Tippenhauer. "On Attacker Models and Profiles for Cyber-Physical Systems." In Computer Security – ESORICS 2016, 427–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45741-3_22.
Bilogrevic, Igor, Julien Freudiger, Emiliano De Cristofaro, and Ersin Uzun. "What’s the Gist? Privacy-Preserving Aggregation of User Profiles." In Computer Security - ESORICS 2014, 128–45. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11212-1_8.
Locasto, Michael E., Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, and Salvatore J. Stolfo. "Return Value Predictability Profiles for Self–healing." In Advances in Information and Computer Security, 152–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89598-5_10.
Marceau, Carla, and Matt Stillerman. "Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)." In Information and Communications Security, 369–78. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11935308_26.
Puzis, Rami, and Yuval Elovici. "Active Discovery of Hidden Profiles in Social Networks Using Malware." In Advances in Information Security, 221–35. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-14039-1_11.
Тези доповідей конференцій з теми "Security Profiles":
Gimmestad, Gary G., David A. Roberts, John M. Stewart, and Jack W. Wood. "Lidar system for monitoring turbulence profiles." In Defense and Security Symposium, edited by Cynthia Y. Young and G. Charmaine Gilbreath. SPIE, 2007. http://dx.doi.org/10.1117/12.720805.
Moldow, Roberta L., Michael T. Bergen, Kari Belin, Luba Bululu, Olivita Couso, Joselyn McLaughlin, Kenneth R. Short, and Richard J. Servatius. "Developing psychophysiological profiles for monitoring stress." In Defense and Security Symposium, edited by Glenn T. Shwaery, John G. Blitch, and Carlton Land. SPIE, 2006. http://dx.doi.org/10.1117/12.665964.
Kern, Joshua V., John B. Ferris, David Gorsich, and Alexander A. Reid. "Characterizing 2D road profiles using ARIMA modeling techniques." In Defense and Security Symposium, edited by Kevin Schum and Dawn A. Trevisani. SPIE, 2007. http://dx.doi.org/10.1117/12.720088.
Priddy, Jody D., Randolph A. Jones, Burhman Q. Gates, Jr., and Josh R. Fairley. "Establishing UGV power requirements based on mission profiles." In Defense and Security Symposium, edited by Grant R. Gerhart, Charles M. Shoemaker, and Douglas W. Gage. SPIE, 2006. http://dx.doi.org/10.1117/12.666289.
Gimmestad, Gary G., David W. Roberts, John M. Stewart, Jack W. Wood, and Frank D. Eaton. "Testing of LIDAR system for turbulence profiles." In SPIE Defense and Security Symposium, edited by G. Charmaine Gilbreath and Linda M. Wasiczko. SPIE, 2008. http://dx.doi.org/10.1117/12.792204.
Keller, John C. "Pursuit profiles: does the technology fit?" In Enabling Technologies for Law Enforcement and Security, edited by John B. Alexander, Debra D. Spencer, Steve Schmit, and Basil J. Steele. SPIE, 1997. http://dx.doi.org/10.1117/12.265420.
Meyer, Ron. "Coherent source transverse field profiles and far-field energy distribution." In SPIE Security + Defence, edited by David H. Titterton and Mark A. Richardson. SPIE, 2012. http://dx.doi.org/10.1117/12.978654.
Koudelka, Melissa L., John A. Richards, and Mark W. Koch. "Multinomial pattern matching for high range resolution radar profiles." In Defense and Security Symposium, edited by Edmund G. Zelnio and Frederick D. Garber. SPIE, 2007. http://dx.doi.org/10.1117/12.720873.
Balozian, Puzant, and Dorothy Leidner. "The Assumptions and Profiles Behind IT Security Behavior." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2017. http://dx.doi.org/10.24251/hicss.2017.605.
Zamfirescu, Raisa-Gabriela, Cosima Rughinis, Alexandra Hosszu, and Darie Cristea. "Cyber-Security Profiles of European Users: A Survey." In 2019 22nd International Conference on Control Systems and Computer Science (CSCS). IEEE, 2019. http://dx.doi.org/10.1109/cscs.2019.00080.
Звіти організацій з теми "Security Profiles":
Stoneburner, Gary. CSPP - guidance for COTS security protection profiles, (formerly:. Gaithersburg, MD: National Institute of Standards and Technology, 1999. http://dx.doi.org/10.6028/nist.ir.6462.
Fossati, T. Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things. Edited by H. Tschofenig. RFC Editor, July 2016. http://dx.doi.org/10.17487/rfc7925.
Howlett, J., and S. Hartman. A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML). Edited by A. Perez-Mendez. RFC Editor, May 2016. http://dx.doi.org/10.17487/rfc7833.
Fang, L., B. Niven-Jenkins, S. Mansfield, and R. Graveman, eds. MPLS Transport Profile (MPLS-TP) Security Framework. RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6941.
Tessin, T. SPI/UNIX user manual: Security Profile Inspector. Office of Scientific and Technical Information (OSTI), November 1989. http://dx.doi.org/10.2172/6845654.
Burgin, K., and M. Peck. Suite B Profile for Internet Protocol Security (IPsec). RFC Editor, October 2011. http://dx.doi.org/10.17487/rfc6380.
Salter, M., and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, January 2012. http://dx.doi.org/10.17487/rfc6460.
Salter, M., E. Rescorla, and R. Housley. Suite B Profile for Transport Layer Security (TLS). RFC Editor, March 2009. http://dx.doi.org/10.17487/rfc5430.
Stoneburner, Gary. COTS security protection profile-operating systems (CSPP-OS) :. Gaithersburg, MD: National Institute of Standards and Technology, 2003. http://dx.doi.org/10.6028/nist.ir.6985.
Zhang, Pengchu C., and Nancy Ann Durgin. Profile-based adaptive anomaly detection for network security. Office of Scientific and Technical Information (OSTI), November 2005. http://dx.doi.org/10.2172/875979.