intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Security capability analysis

Xem 1-9 trên 9 kết quả Security capability analysis
  • The research aims to propose solutions for mergers between Vietnamese securities companies to improve the financial capacity of securities companies currently operating on the Vietnam Stock Exchange - VNX (HNX, HoSE and Upcom exchanges). Through research samples collected from 27 Vietnamese securities companies in the period from 2014 to 2021, secondary data are audited financial statements and financial safety reports. By using the quantitative research method of principal component analysis PCA (Principal Component Analysis) and K-means (cluster) analysis on SPSS 20 software.

    pdf8p leminhvu111 07-06-2024 1 0   Download

  • This article examines the factors influencing the development of electronic banking services at LienViet Post Joint Stock Commercial Bank (LPBank). The results reveal seven factors that significantly impact the development of electronic banking services at LPBank, ranked in order of importance from high to low: Service products, Staff service capabilities, Accessibility convenience, Technological system, Reachability, Marketing & customer care, and finally, Security.

    pdf14p longtimenosee09 08-04-2024 5 2   Download

  • Empirical mode decomposition (EMD) has developed into a prominent tool for adaptive, scale-based signal analysis in various fields like robotics, security and biomedical engineering. Since the dramatic increase in amount of data puts forward higher requirements for the capability of real-time signal analysis.

    pdf18p guernsey 28-12-2021 10 0   Download

  • This paper investigates a cognitive radio network where a secondary sender assists a primary transmitter in relaying primary information to a primary receiver and also transmits its own information to a secondary recipient. This sender is capable of jamming to protect secondary and/or primary information against an eavesdropper and self-powering by harvesting radio frequency energy of primary signals. Security capability of both secondary and primary networks are analyzed in terms of secrecy outage probability.

    pdf27p nguathienthan9 08-12-2020 6 1   Download

  • This research focuses on analysis malware using static method in operating system environment. Thus, we focus on malware analysis that uses Anti-Virtualisation avoidance technique. Although our platform environment exposed to the threat by malware sample, we protect this environment by using Toolwiz TimeFreeze and window backup image to protect and secure our environment. This research proved that our environment capable to do malware analysis and compare our environment with the virtual machine environment to prove that our analysis more accurate.

    pdf5p girlsseek 27-02-2019 35 0   Download

  • Assurance technology: Develop a sound scientific and technological basis, including formal methods and computational frameworks, for assured design, construction, analysis, evaluation, and implementation of reliable, robust, safe, secure, stable, and certifiably dependable systems regardless of size, scale, complexity, and heterogeneity; develop software and system engineering tool capabilities to achieve application and problem domain-based assurance, and broadly embed these capabilities within the system engineering process; reduce the effort, time, and cost of assurance (“aff...

    pdf119p nhacsihuytuan 13-04-2013 54 6   Download

  • Tham khảo sách 'safety and justice program and the global risk and security center', giáo dục - đào tạo, cao đẳng - đại học phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf0p mymi0809 24-01-2013 55 4   Download

  • Threat Discovery Services provides corporatewide traffic threat detection and analysis capabilities via a threat discovery appliance or any VMware-based system. It is deployed out of band at the network layer on the core switch, where it can monitor the stealth techniques being used by modern malware to provide 24 x 7 network monitoring and detection of hidden malware infections. The threat discovery technology detects day-zero infections by leveraging Trend Micro Smart Protection Network and multiple threat analysis engines.

    pdf10p khongmuonnghe 04-01-2013 64 3   Download

  • In this example, the intruder gains access to username/password information and sensitive routing protocol data using an Ethernet packet decoder such as EtherPeek. The data packets being sent are captured by the laptop running EtherPeek; the program decodes the hex data into human-readable form. After obtaining access to information, the intruder can use this information to gain access to a machine and then possibly copy-restricted, private infor- mation and programs.

    pdf61p cao_can 02-01-2013 51 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2