Zobrazeno 1 - 10
of 182
pro vyhledávání: '"Paul A. Wortman"'
Autor:
Paul A. Wortman, John A. Chandy
Publikováno v:
Discover Internet of Things, Vol 2, Iss 1, Pp 1-30 (2022)
Abstract Design and development of ubiquitous computer network systems has become increasingly difficult as technology continues to grow. From the introduction of new technologies to the discovery of existing threats, weaknesses, and vulnerabilities
Externí odkaz:
https://doaj.org/article/3cbc6c7af6ec4dc6b28d2fce4ea74579
Autor:
St. Pierre, Robert G.
Publikováno v:
Educational Evaluation and Policy Analysis, 1983 Oct 01. 5(3), 382-384.
Externí odkaz:
https://www.jstor.org/stable/1164135
Autor:
Feldman, Kenneth A.
Publikováno v:
Journal of the American Statistical Association, 1986 Mar 01. 81(393), 253-255.
Externí odkaz:
https://www.jstor.org/stable/2288004
Autor:
White, Karl R., Myette, Beverly
Publikováno v:
American Journal of Evaluation; August 1982, Vol. 3 Issue: 3 p46-56, 11p
Autor:
Rowe, Judith S.
Publikováno v:
Contemporary Sociology, 1983 Mar 01. 12(2), 169-169.
Externí odkaz:
https://www.jstor.org/stable/2066728
Autor:
Karl R. White, Beverly M. Myette
Publikováno v:
Evaluation News. 3:46-56
Autor:
Paul A. Wortman, John A. Chandy
Publikováno v:
Journal of Cybersecurity. 6
As development and deployment of secure systems continue to grow at scale, there is an equal need to evaluate these systems for vulnerabilities and other problems. However, the process of evaluating these designs is complicated and mainly proprietary
Publikováno v:
IET Computers & Digital Techniques. 12:289-296
Continued growth and development in the consumer electronic market have greatly increased in the realm of home automation. With this swelling in smart, Internet-connected consumer electronics, there is a need to ensure the safe and secure use of thes
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 26:1084-1097
True random number generators (TRNGs) are central to many computing applications, particularly in security domains such as cryptography. In this paper, we consider the design and implementation of a low-cost and lightweight TRNG. In the interest of b
Autor:
John A. Chandy, Paul A. Wortman
Publikováno v:
Systems Engineering in Context ISBN: 9783030001131
As development and implementation of the Internet of Things (IoT) and embedded systems technologies increase, there is the need for a design framework that allows for thorough exploration of potential designs while detecting any potential risks and s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3f314484b29daf014f5b5f28e47f13bb
https://doi.org/10.1007/978-3-030-00114-8_39
https://doi.org/10.1007/978-3-030-00114-8_39