Buscar
Mostrando ítems 1-10 de 9160
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ...
Model-based development of security requirements
(Centro Latinoamericano de Estudios en Informática, 2011)
Unsupervised Visualization of SQL Attacks by Means of the SCMAS Architecture
(2010-07-02)
This paper presents an improvement of the SCMAS architecture aimed at securing SQL-run databases. The main goal of such architecture is the detection and prevention of SQL injection attacks. The improvement consists in the ...
Sustaining Social Security
(Universidad de San Andrés. Departamento de Economía, 2004-06)
Um modelo de segurança para o sistema de prescrição eletrônica do HUSM
(Universidade Federal de Santa MariaBrasilUFSMCentro de Tecnologia, 2008-12-15)
The University Hospital of Santa Maria (HUSM) offers different services for the local community and new technologies in all of the sectors of the hospital allows a better control of administrative and clinical activities, ...
Mathematical model for a temporal-bounded classifier in security environments
(08/01/2012)
Security is a major concern when web applications are implemented. This has led to the proposal of a variety of specifications and approaches to provide the necessary security for these environments. SQL injection attacks ...
A Security Situation Awareness Approach for IoT Software Chain Based on Markov Game Model
Since Internet of Things (IoT) has been widely used in our daily life nowadays, it is regarded as a promising and popular application of the Internet, and has attracted more and more attention. However, IoT is also suffered ...
Formal validation of automated policy refinement in the management of network security systems
(SPRINGER, 2010)
Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ...