Showing 1 - 10 of 702
The paper approaches the low-level details of the code generated by compilers whose format permits outside actions. Binary code modifications are manually done when the internal format is known and understood, or automatically by certain tools developed to process the binary code. The binary...
Persistent link: https://www.econbiz.de/10010727926
Cross-Site Scripting (XSS) is a pervasive vulnerability that involves a huge portion of modern web applications. Implementing a correct and complete XSS filter for user-generated content can really be a challenge for web developers. Many aspects have to be taken into account sincethe attackers...
Persistent link: https://www.econbiz.de/10010595362
The focus is set on the browser as the main source of information risk due to the access provided to the web users. This section assesses the practical arrangements for a secured Internet connection - secure socket layer, avoiding practices like spoofing and phishing with Java script, digital...
Persistent link: https://www.econbiz.de/10004983364
This paper proposes a methodology of designing a Maximum Power Point Tracking (MPPT) controller for photovoltaic systems (PV) using a Fuzzy Gain Scheduling of Proportional-Integral-Derivative (PID) type controller (FGS-PID) with adaptation of scaling factors (SF) for the input signals of FGS....
Persistent link: https://www.econbiz.de/10010806571
Deduction theorem and its weak forms in classical mathematical logic system, Łukasiewicz logic system, Gödel logic system, product logic system, and the fuzzy logic system ℒ* are discussed and compared. It is pointed out that the weak form of deduction theorem in ℒ* has a clear structure...
Persistent link: https://www.econbiz.de/10005050801
Graphical presentations of human actions in incident and accident sequences have been used for many years. However, for the most part, human decision making has been underrepresented in these trees. This paper presents a method of incorporating the human decision process into graphical...
Persistent link: https://www.econbiz.de/10009435378
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information...
Persistent link: https://www.econbiz.de/10009435395
This report introduces a new perspective on the basic concept of dependent failures where the definition of dependency is based on clustering in failure times of similar components. This perspective has two significant implications: first, it relaxes the conventional assumption that dependent...
Persistent link: https://www.econbiz.de/10009435403
Environmental radiological assessments rely heavily on the use of mathematical models. The predictions of these models are inherently uncertain because these models are inexact representations of real systems. The major sources of this uncertainty are related to biases in model formulation and...
Persistent link: https://www.econbiz.de/10009435418
GWPC, DOGGR, and other state agencies propose to build eBusiness applications based on a .NET front-end user interface for the DOE's Energy 100 Award-winning Risk Based Data Management System (RBDMS) data source and XML Web services. This project will slash the costs of regulatory compliance by...
Persistent link: https://www.econbiz.de/10009435420