𝔖 Bobbio Scriptorium
✦   LIBER   ✦

TruSecure turns to application-based vulnerability assessment

✍ Scribed by Brian McKenna


Publisher
Elsevier Science
Year
2004
Weight
253 KB
Volume
1
Category
Article
ISSN
1742-6847

No coin nor oath required. For personal study only.

✦ Synopsis


Pioneering group within information security research, education and training, offering independent expertise in a field where trust and integrity are paramount.

World-leading masters degree programmes

MSc Information Security (MSc IS) MSc Secure Electronic Commerce (MSc SEC) Taught by experts from industry and academia Over 250 students on campus MSc IS available by e-learning from


πŸ“œ SIMILAR VOLUMES


APPLICATION OF MINIMUM CROSS ENTROPY TO
✍ G.H. Choi; G.S. Choi πŸ“‚ Article πŸ“… 1996 πŸ› Elsevier Science 🌐 English βš– 293 KB

This paper discusses model-based monitoring as one of key steps toward building an in-process diagnostic tool for the supervisory control level in diamond turning. In particular, the concept of information-theoretic measure called cross entropy, and Kullback's principle and some of the fundamental p

Assessment of methods used for predictin
✍ Vellarkad N. Viswanadhan; M. Rami Reddy; Russell J. Bacquet; Mark D. Erion πŸ“‚ Article πŸ“… 1993 πŸ› John Wiley and Sons 🌐 English βš– 728 KB

Estimating log P (logarithm of "1-octanol to water" partition coefficients) as a memure of lipophilicity for organic compounds is of considerable importance in drug discovery. Several methods have been developed for this purpose, each with its own drawbacks and advantages. In this article, a systema