Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... more
    • by 
    •   8  
      Network SecurityRisk and VulnerabilityComputer SecurityVulnerability
C4I (command, control, communications, computer and intelligence) system is a complex system of systems that enables the military commander to achieve decision superiority by affecting adversary's information and information based... more
    • by 
    •   13  
      Information SystemsInformation TechnologyComputational ModelingComputer Networks
Due to the increasing heterogeneity and complexity of web, testing the web application for security becomes an essential task. The objective of the security testing is to find the vulnerabilities or weaknesses of software applications. As... more
    • by  and +2
    •   12  
      MathematicsComputer ScienceInformation TechnologyTechnology
    • by 
    • Threat Modeling
Structured Query Language Injection Attack (SQLIA) is one of the most prevalent cyber attacks against web-based application vulnerabilities; that are manipulated through injection techniques to gain access to restricted data, bypass... more
    • by 
    •   4  
      Data MiningMultiple criteria decision making (MCDM)Threat ModelingSQL Injection Attacks (SQLIAs)
The risks to conflict practitioners, peacemakers, humanitarian aid workers, and others serving ‘in the field’ are diverse, deeply contextual, and ever-changing. While ample literature exists focused around documenting and evaluating the... more
    • by 
    •   20  
      Peace and Conflict StudiesConflictSecurity StudiesPolitical Violence and Terrorism
The rapid evolution of the Information and Communications Technology (ICT) services transforms the conventional electrical grid into a new paradigm called Smart Grid (SG). Even though SG brings significant improvements, such as increased... more
    • by 
    •   3  
      Threat ModelingScada SecurityOSSIM
Structured Query Language Injection Attacks (SQLIA) from attackers’ exploit have progressively increased the danger of cyber attacks to steal confidential information from the database of vulnerable web application front-ends. These cyber... more
    • by  and +1
    •   9  
      Artificial IntelligenceMachine LearningData MiningData Security
This thesis explores the value of threat models in organisation-wide security testing of databases. Factors that drive security testing are explored. Different types of security testing, different approaches to threat modeling and... more
    • by 
    •   13  
      Information SystemsControl Systems EngineeringInformation SecurityDatabase Systems
This thesis explores the value of threat models in organisation-wide security testing of databases. Factors that drive security testing are explored. Different types of security testing, different approaches to threat modeling and... more
    • by 
    •   15  
      GovernanceComplianceDatabase SecurityCyber Security
    • by 
    •   4  
      TAMThreat ModelingCorasPTA
Threat modeling appears as a modern tool in the hands of Information Security experts, Systems administrators and IT professionals in order to address contemporary IT problems. As we can see, though, the process of Threat modelling is a... more
    • by 
    •   7  
      Information TechnologyInformation SecurityCyber SecurityIT Security
    • by 
    •   9  
      Intellectual PropertyCybercrimesAuditingMobile Computing
The mobile telecom industry is changing and the competitive landscape for mobile network operators has been disrupted. The industry is shifting from an environment characterized by reliability and scale of networks, to an environment... more
    • by  and +1
    •   7  
      Artificial IntelligenceMachine LearningData MiningFuzzy Logic
    • by 
    •   13  
      Information SystemsInformation TechnologyComputational ModelingComputer Networks
Current threat modeling methodologies and tools are biased toward systems under development. While, organizations whose IT portfolio is made up of a large number of legacy systems, that run on fundamentally different and incongruous... more
    • by 
    •   3  
      UMLThreat ModelingSTRIDE
The Hospital Management Information System (SIMRS) functions as a medium for hospital information and hospital management. There are patient medical record data, which is the result of interactions between doctors and sufferer. Medical... more
    • by 
    •   5  
      E-HealthThreat ModelingDreadSIMRS
The integration between cloud computing and vehicular ad hoc networks, namely, vehicular clouds (VCs), has become a significant research area. This integration was proposed to accelerate the adoption of intelligent transportation systems.... more
    • by  and +1
    •   10  
      Decision MakingSecurity AnalysisCloud Computing SecurityThreat Modeling
Northern Australia’s unique and rich biodiversity faces numerous threatening processes. Currently, there is limited knowledge of i) the distribution of species of conservation concern across northern Australia, ii) their level of exposure... more
    • by  and +1
    •   20  
      Species Distribution ModelsInvasive SpeciesBig DamsEndangered Species
    • by 
    •   6  
      Software EngineeringRequirements EngineeringAspect Oriented Software DevelopmentSecurity Metrics
a. Research a threat modeling tool that you consider is best to model threats to information systems. Provide a diagram of the modeling tool similar to Figure 1 in the article. (2 pts)
    • by 
    •   2  
      Threat ModelingUMUC 610
... Tom Johnsten University of South Alabama, TJohnsten@usouthal.edu Matt Campbell University of South Alabama, mattcampbell@usouthal.edu ... Matt Campbell University of South Alabama mattcampbell@usouthal.edu Priya Patidar... more
    • by 
    •   3  
      Risk assessmentThreat ModelingRisk Assessment
    • by 
    •   6  
      TechnologyPrivacy and data protectionData SecurityBiobanking
Health records are an integral aspect of any Hospital Management System. With newer innovations in technology, there has been a shift in the way of recording health information. Medical records which used to be managed using various paper... more
    • by 
    •   7  
      Information SecurityRiskElectronic Health RecordsComputer Security
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and... more
    • by 
    •   4  
      PrivacyMethod EngineeringThreat ModelingCloud Software Development
... Tom Johnsten University of South Alabama, TJohnsten@usouthal.edu Matt Campbell University of South Alabama, mattcampbell@usouthal.edu ... Matt Campbell University of South Alabama mattcampbell@usouthal.edu Priya Patidar... more
    • by 
    •   3  
      Risk assessmentThreat ModelingRisk Assessment
    • by 
    • Threat Modeling
Threat modeling is a structured process to identify and enumerate potential threats such as vulnerabilities or lack of defense mechanisms and prioritize security mitigations. Threat modeling intends to equip defenders and the security... more
    • by 
    •   13  
      Information SecurityCyber crimeCyberwarfareCybersecurity
... Tom Johnsten University of South Alabama, TJohnsten@usouthal.edu Matt Campbell University of South Alabama, mattcampbell@usouthal.edu ... Matt Campbell University of South Alabama mattcampbell@usouthal.edu Priya Patidar... more
    • by 
    •   3  
      Risk assessmentThreat ModelingRisk Assessment
Page 1. Identifying Security Requirements Hybrid Technique Vandana Gandotra, Archana Singhal, Punam Bedi, University of Delhi, Delhi, India vandanarla@yahoo.co.in, punambedi@gmail.com, singhal_archana@yahoo.com ... [8] A.Adya, P. Bahl, R.... more
    • by 
    •   9  
      EngineeringComputer ScienceSoftware EngineeringComplex System
... Tom Johnsten University of South Alabama, TJohnsten@usouthal.edu Matt Campbell University of South Alabama, mattcampbell@usouthal.edu ... Matt Campbell University of South Alabama mattcampbell@usouthal.edu Priya Patidar... more
    • by 
    •   3  
      Risk assessmentThreat ModelingRisk Assessment
The Hospital Management Information System (SIMRS) functions as a medium for hospital information and hospital management. There are patient medical record data, which is the result of interactions between doctors and sufferer. Medical... more
    • by 
    •   5  
      E HealthThreat ModelingDreadSIMRS
This paper begins a process of organizing knowledge of health information security threats into a comprehensive catalog. We begin by describing our risk management perspective of health information security, and then use this perspective... more
    • by 
    •   3  
      Risk assessmentThreat ModelingRisk Assessment
Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as... more
    • by 
    •   7  
      Cognitive ScienceMobile Ad Hoc NetworksMobile Ad Hoc NetworkComputer Software
    • by 
    •   13  
      EngineeringComputer ScienceTechnologyDecision Making
Current threat modeling methodologies and tools are biased toward systems under development. While, organizations whose IT portfolio is made up of a large number of legacy systems, that run on fundamentally different and incongruous... more
    • by 
    •   3  
      UMLThreat ModelingSTRIDE
    • by 
    •   12  
      Computer ScienceComputational ModelingSystems AnalysisRisk Analysis
    • by 
    •   6  
      TechnologyPrivacy and data protectionData SecurityBiobanking
Transportation cyber-physical systems (TCPS) have the potential to generate, process and exchange significant amounts of security-critical, safety-critical and privacy-sensitive information, which makes them attractive targets for... more
    • by 
    •   9  
      Machine LearningRisk Assessment & Risk ManagementCybersecurityThreat Modeling
As we are aware that security environment for software system is changing constantly. Due to expanding connectivity and development of complex software systems risk management is posing serious challenges to the designers. This has become... more
    • by  and +1
    •   8  
      Systems AnalysisRisk ManagementCase StudyProfitability