Security analysis

Results: 6956



#Item
481

A Framework for Quantitative Security Analysis of Machine Learning ∗ Pavel Laskov

Add to Reading List

Source URL: www-rsec.cs.uni-tuebingen.de

Language: English - Date: 2010-03-31 08:41:00
    482

    Prioritizing Security Spending: A Quantitative Analysis of Risk Distributions for Different Business Profiles Armin Sarabi, Parinaz Naghizadeh, Yang Liu, Mingyan Liu University of Michigan, Ann Arbor {arsarabi, naghizad,

    Add to Reading List

    Source URL: weis2015.econinfosec.org

    Language: English
      483Risk analysis / Finance / Money / Computer security / Risk / Financial risk / Risk factor / Investment / Actuarial science

      MediaSCORE and MediaRIVERS Media Preservation Prioritization Software User Guide Guide created by: Allison Bohm

      Add to Reading List

      Source URL: www.avpreserve.com

      Language: English - Date: 2015-03-14 19:29:25
      484

      Formal Modeling and Automated Analysis of Security Protocols Steve Kremer Inria Nancy FOSAD 2014

      Add to Reading List

      Source URL: webloria.loria.fr

      Language: English - Date: 2014-09-05 05:50:49
        485Computer security / Security / Actuarial science / Risk analysis / IT risk management / Risk management / Risk / Vulnerability / IT risk / Threat / Risk based internal audit / RiskMetrics

        PDF Document

        Add to Reading List

        Source URL: www.nebraskacert.org

        Language: English - Date: 2013-07-14 11:50:09
        486

        REAL ID IMPLEMENTATION REVIEW: FEW BENEFITS, STAGGERING COSTS ANALYSIS OF THE DEPARTMENT OF HOMELAND SECURITY’S NATIONAL ID PROGRAM ELECTRONIC PRIVACY INFORMATION CENTER

        Add to Reading List

        Source URL: www.privacylives.com

        Language: English - Date: 2008-09-29 12:01:12
          487

          SECURITY ANALYSIS OF NETWORK PROTOCOLS: COMPOSITIONAL REASONING AND COMPLEXITY-THEORETIC FOUNDATIONS A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE

          Add to Reading List

          Source URL: seclab.stanford.edu

          Language: English - Date: 2010-07-17 01:14:09
            488

            More Work for the Weapons Labs, Less Security for the Nation An Analysis of the Bush Administration’s Nuclear Weapons Policy A Report for Tri-Valley CAREs

            Add to Reading List

            Source URL: www.trivalleycares.org

            Language: English - Date: 2009-10-05 20:18:46
              489

              Verification of Security Protocols References – J. C. Mitchell, V. Shmatikov, and U. Stern. Finitestate analysis of SSL 3.0, USENIX, 1998. – F. J.Thayer Fábrega, J. C. Herzog, J. D. Guttman. Strand spaces: proving

              Add to Reading List

              Source URL: hagi.is.s.u-tokyo.ac.jp

              Language: English - Date: 2012-01-15 23:43:15
                490

                The CASPA Tool: Causality-based Abstraction for Security Protocol Analysis (Tool Paper) Michael Backes1,2, Stefan Lorenz1 , Matteo Maffei1 , and Kim Pecina1 1

                Add to Reading List

                Source URL: sps.cs.uni-saarland.de

                Language: English - Date: 2013-10-09 19:06:18
                  UPDATE