Keywords: ارزیابی امنیتی; Survey; Body area network; Body sensor network; Key agreement; Security evaluation; Performance evaluation;
مقالات ISI ارزیابی امنیتی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: ارزیابی امنیتی; Cyber-physical system (CPS); Security modeling; Security evaluation; Game theory;
Keywords: ارزیابی امنیتی; Cyber-physical systems (CPSs); Security evaluation; Physical dynamics; Consequence propagation;
Keywords: ارزیابی امنیتی; Cloud security; Security quantification; Security evaluation; Security level agreements; Security metrics;
Keywords: ارزیابی امنیتی; Security evaluation; Adversary adaptation; Homeland security; Critical infrastructure protection; Counterterrorism;
A broker-based framework for standardization and management of Cloud Security-SLAs
Keywords: ارزیابی امنیتی; Standard Security-SLA; Service selection; Security evaluation; Security-SLA optimization; Security-SLA monitoring;
Three-Step Approach to QoS Maintenance in Cloud Computing Using a Third-Party Auditor
Keywords: ارزیابی امنیتی; cloud computing; security evaluation; cloud service providers; cloud service agreement; quality of service; service level agreement;
Towards quantification and evaluation of security of Cloud Service Providers
Keywords: ارزیابی امنیتی; Security quantification; Security evaluation; Cloud Service Provider (CSP); Cloud Security Services; Security metrics; Goal-Question-Metric (GQM) method;
A new cyber security risk evaluation method for oil and gas SCADA based on factor state space
Keywords: ارزیابی امنیتی; Oil and gas SCADA system; Security evaluation; Factor state space; Fuzzy comprehensive evaluation method00-01; 99-00
Evaluation of biometric system performance in the context of Common Criteria
Keywords: ارزیابی امنیتی; Biometrics; Security evaluation; Common Criteria (CC); Common Evaluation Methodology (CEM); Biometric performance testing; Vulnerability
A novel approach to evaluate software vulnerability prioritization
Keywords: ارزیابی امنیتی; Software vulnerability; Security evaluation; Fuzzy AHP; Fuzzy synthetic; Fuzzy integral
A framework for quantitative evaluation of parallel control-flow obfuscation
Keywords: ارزیابی امنیتی; Software obfuscation; Security evaluation; Reverse engineering; Software metrics; Control flow graph
A high performance fingerprint liveness detection method based on quality related features
Keywords: ارزیابی امنیتی; Fingerprints; Liveness detection; Quality assessment; Security evaluation; Vulnerabilities; Countermeasures
Security evaluation of biometric keys
Keywords: ارزیابی امنیتی; Biometric cryptosystems; Biometric keys; Biometric entropy; Security evaluation; Effective entropy; Face-based keys
A trust negotiation based security framework for service provisioning in load-balancing clusters
Keywords: ارزیابی امنیتی; Access control; Trust negotiation; Web services security; Security proxy; Security evaluation; Load-balancing cluster
A hybrid ranking approach to estimate vulnerability for dynamic attacks
Keywords: ارزیابی امنیتی; Security evaluation; Hybrid ranking; Attack graph; CVSS; Dynamic scenarios
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
Keywords: ارزیابی امنیتی; Network security; Intrusion detection; Risk management; Incident response; Security evaluation
Self-optimization of secure web services
Keywords: ارزیابی امنیتی; Self-optimization; Web services; Performance prediction; Security evaluation; Autonomic