Avancerad sökning

Hittade 4 avhandlingar som matchar ovanstående sökkriterier.

  1. 1. Evaluation and enhancement of operational security based on experimental data

    Författare :Ulf Gustafson; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; security; PPC network; vulnerability; detection; experimentation; unix; intrusion; modelling;

    Sammanfattning : .... LÄS MER

  2. 2. Observations on Operating System Security Vulnerabilities

    Författare :Stefan Lindskog; Karlstads universitet; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; computer security; operating system; vulnerability; intrusion; experiment; modeling; analysis; Datavetenskap; Computer Science;

    Sammanfattning : This thesis presents research on computer security vulnerabilities in general-purpose operating systems. The objective is to investigate intrusions in such systems in order to find and model the underlying generic weaknesses, i.e., weaknesses that would be applicable to many different systems. LÄS MER

  3. 3. Software Development Productivity Issues in Large Telecommunication Applications

    Författare :Piotr Tomaszewski; Blekinge Tekniska Högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; productivity; measurement; improvement;

    Sammanfattning : The high non-functional requirements of telecommunication applications increase their complexity. Introducing a new and specialized technology is often seen as a way of meeting these high non-functional requirements. An example of such a technology is a software platform that provides high performance and availability. LÄS MER

  4. 4. Practical Experimentation as a Tool for Vulnerability Analysis and Security Evaluation

    Författare :Tomas Olovsson; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; computers; dependability; vulnerabilities; tiger teams; taxonomy; operational security; analysis; security; terminology;

    Sammanfattning : The first part of this thesis describes the results of applying dependability methods to the security area. A uniform taxonomy for security, expected to contain all characteristic attributes, is presented. This taxonomy will hopefully increase the understanding of security issues. LÄS MER