Security analysis
-
This paper presents the impacts of Electric Vehicle Charging Stations (EVCSs) on voltage and frequency quality in the Microgrid. It addresses security analysis, voltage and frequency quality, as well as issues related to EVCSs.
13p viling 11-10-2024 1 0 Download
-
In this paper, we research and propose a network attack detection framework using a 2-stage classification algorithm with an Autoencoder model, integrating online stream processing technology based on Apache Kafka and Spark technology.
17p viyoko 01-10-2024 3 1 Download
-
The paper presents the results of an analysis of the decrease in cryptographic strength of the most common symmetric ciphers, taking into account the development of cryptanalytic methods. The vector of the threat to the reduction of information confidentiality stored and processed in information systems in the long term has been determined.
7p viyoko 01-10-2024 4 1 Download
-
Regular expressions, or regexes, have become an integral part of modern software development, seamlessly woven into the fabric of countless applications. This paper explores the inherent ambiguity of regular expressions, fuzzing with static analysis and proposes a novel fuzzing technique to generate effective attack patterns.
11p viyoko 01-10-2024 5 1 Download
-
This article presents a comprehensive analysis of Denisenko's method for constructing quantum circuits for S-boxes without using ancilla qubits. We elaborate on this methodology in terms of practical aspects that can be applied to S-boxes or permutations of arbitrary sizes.
14p viyoko 01-10-2024 4 1 Download
-
In this paper, we conduct a new analysis on the complexity of the same. We also remove the restriction of using a primitive polynomial to generate the matrix by using an arbitrary monic polynomial over a finite field whose independent term is distinct from zero.
15p viyoko 01-10-2024 5 1 Download
-
The purpose of this study is to delineate and scrutinize the relationship between climate change and human security so that a more comprehensive understanding of the phenomenon is achieved.
138p hoanglongjp 14-07-2023 13 6 Download
-
The organisation of the thesis will follow a seven-chapter structure. The researcher will use the term thesis as used by Perry (1994) to describe the entire work, while the related terms research and study will be used interchangeably when referring to the research undertaken in the thesis. This thesis could make a significant contribution to the social control literature by addressing these shortcomings and identifying and examining the formal and informal mechanisms used conjointly by the government and its agencies to control social security expenditures and also social outcomes.
350p runthenight04 02-02-2023 7 2 Download
-
Security Evaluation Schemes:
+ ETSI 303 645 & Cybersecurity Labelling Scheme
+ Eurosmart Scheme
+ GSMA IoT Security Assessment
+ Case-study (steps & feedbacks): Vulnerability analysis of an IP Camera
Reference: Cyber Security
32p trinhthamhodang1217 06-04-2020 1309 2 Download
-
In this study, panel data analysis is performed to assess not only the Textile Sector which holds an important place in Turkish Economy but also the impact of Research and Development investments of 14 firms, competing in national and international markets in this sector with public securities traded in Istanbul Stock Exchange, on their market prices, net sales and equity capital.
8p guineverehuynh 21-06-2020 31 5 Download
-
Consumer behavior is the study of individuals, groups, or organizations and the processes they use to select, secure, and dispose of products, services, experiences, or ideas to satisfy needs and the impacts that these processes have on the consumer and society.
5p guineverehuynh 22-06-2020 35 0 Download
-
In this paper, the authors use analytical method of explore factor analysis to determining factors that are components of the training quality (by service quality) at Lac Hong University (LHU) in Dong Nai province. This paper conducted during the period from from June 2012 to June, 2015. The exploratory factor analysis result showed that there were four factors, which included of factors following Teaching (Lecturers); Facilitie.
7p byphasse043256 23-03-2019 31 1 Download
-
This renovation process is currently facing many difficulties and challenges, the most critical of which concerns financial security in the context of a relatively weak economy.
9p vinhbinhnguyen 14-06-2017 70 3 Download
-
Based on analysis of a number of theoretical issues about the role of social security for SP and assessing the situation on the role of social security in Vietnam SP in recent years, the thesis proposed solutions to promote basic the role of social security in our country for the current SP.
27p change05 08-06-2016 71 7 Download
-
This chapter include objectives: Describle the principles of secure network design, describle threat identificaion and risk analysis, describle risk managenment and risk avoidance, describle the Cisco SecureX architecture, describle operation security,...
82p youcanletgo_01 04-01-2016 75 4 Download
-
Chương 14 trang bị cho người học những hiểu biết về các đặc tính bảo mật trong Windows Server 2003. Mục tiêu học tập của chương này gồm có: Xác định các phần tử và kỹ thuật khác nhau dùng để bảo mật hệ thống Windows Server 2003, Dùng các công cụ Security Configuration and Analysis để cấu hình và rà soát các thiết lập bảo mật, kiểm toán truy vập vào các tài nguyên và xem lại các thiết lập Security log. Mời tham khảo.
45p kiepnaybinhyen_03 15-12-2015 71 7 Download
-
Stocks are not the most important sources of external financing for businesses (figure 1) == Why? Issuing marketable debt and equity securities is not the primary way in which businesses finance their operations (figure 1) == Why? Indirect finance is many times more important than direct finance ((figure 1) == Why? Financial intermediaries are the most important source of external funds (figure 1) == Why?
22p sony_12 25-06-2013 68 11 Download
-
The two approaches to valuing common stocks using fundamental security analysis are: Discounted Cash flow techniques. Attempts to estimate the value of a stock today using a present value analysis. Relative valuation techniques. A stock is valued relative to other stocks based on the basis of ratios.
101p team4mvc02 12-06-2013 51 4 Download
-
How important is conflict of interest to the professions? The answer is complex. Consider what recently happened to PriceWaterhouseCoopers (PWC), the world's largest accounting firm. PWC hired an outside investigator (at the urging of the Securities and Exchange Commission) to determine whether the firm was observing its own conflict-of-interest rules. The investigator reported that more than three-fourths of PWC's partners, including thirty-one of the top fortythree, had not properly sanitized their personal finances....
364p haiduong_1 28-02-2013 54 10 Download
-
Wireless technology has enormous potential to change the way people and things communicate. Future wireless networks will allow people on the move to communicate with anyone, anywhere, and at any time using a range of high-performance multimedia services. Wireless video will support applications such as enhanced social networking, distance learning and remote medicine. Wireless sensor networks can also enable a new class of intelligent home electronics, smart and energy-efficient buildings and highways, and in-body networks for analysis and treatment of medical conditions....
33p muathu_102 28-01-2013 76 6 Download