Security Analysis

Results: 6956



#Item
91

An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Yogesh Simmhan∗‡ , Alok Gautam Kumbhare∗† , Baohua Cao∗† , and Viktor Prasanna∗†‡ ∗ Center for Energy Informat

Add to Reading List

Source URL: ganges.usc.edu

- Date: 2011-10-17 17:23:54
    92

    Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems Sibin Mohan Dept. of Computer Science, North Carolina State University, Raleigh, NCAbstract

    Add to Reading List

    Source URL: www.cs.virginia.edu

    - Date: 2008-02-18 18:05:28
      93

      Noname manuscript No. (will be inserted by the editor) Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-04-24 16:50:14
        94

        Global Research and Analysis Team Kaspersky Lab processes more than 325,000 new malicious files every day. While the majority are detected and analyzed automatically, a few require manual input from a security expert. Th

        Add to Reading List

        Source URL: cdn.press.kaspersky.com

        - Date: 2015-10-30 16:26:19
          95

          IT Security Analysis Worldwide March 2015 Content security market trends for 2014: small business In 2014, the enterprise content security market grew by 9.9% according to Canalys estimates. For the small business segmen

          Add to Reading List

          Source URL: www.trendmicro.com

          - Date: 2015-04-06 00:37:48
            96

            Security analysis of Dutch smart metering systems Security analysis of Dutch smart metering systems Sander Keemink and Bart Roos July 2, 2008

            Add to Reading List

            Source URL: www.delaat.net

            - Date: 2014-07-21 06:03:55
              97

              DEPARTMENT OF ARKANSAS STATE POLICE RULES FOR LICENSING AND REGULATION OF PRIVATE INVESTIGATORS, PRIVATE SECURITY AGENCIES, ALARM SYSTEMS COMPANIES, POLYGRAPH EXAMINERS, AND VOICE STRESS ANALYSIS EXAMINERS SECTION 1. TIT

              Add to Reading List

              Source URL: static.ark.org

              - Date: 2016-10-19 16:10:47
                98

                An Introduction to Security API Analysis ? Riccardo Focardi1 , Flaminia L. Luccio1 and Graham Steel2 1

                Add to Reading List

                Source URL: www.lsv.ens-cachan.fr

                - Date: 2011-09-12 03:35:59
                  99

                  SECURITY EVALUATION ANALYSIS AND RESEARCH LABORATORY LTD. SECURITY ADVISORY V3.0 MULTIPLE VULNERABILITIES IN D-LINK

                  Add to Reading List

                  Source URL: www.search-lab.hu

                  - Date: 2015-05-27 08:55:25
                    100

                    Published in Software Safety and Security; Tools for Analysis and Verification. NATO Science for Peace and Security Series, vol 33, pp286-318, 2012 A Primer on Separation Logic (and Automatic Program Verification and Ana

                    Add to Reading List

                    Source URL: www.lsv.ens-cachan.fr

                    - Date: 2014-03-02 08:55:00
                      UPDATE