Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
2,708,106
result(s) for
"Securities analysis"
Sort by:
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
by
Bermejo Higuera, Javier
,
Sicilia Montalvo, Juan-Antonio
,
Bermejo Higuera, Juan-Ramón
in
analysis security testing
,
dynamic analysis security testing
,
interactive analysis security testing
2020
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they are designed for. In addition, their different designs mean that they have different percentages of false positives. In order to take advantage of the possible synergies that different analysis tools types may have, this paper combines several static, dynamic and interactive analysis security testing tools—static white box security analysis (SAST), dynamic black box security analysis (DAST) and interactive white box security analysis (IAST), respectively. The aim is to investigate how to improve the effectiveness of security vulnerability detection while reducing the number of false positives. Specifically, two static, two dynamic and two interactive security analysis tools will be combined to study their behavior using a specific benchmark for OWASP Top Ten security vulnerabilities and taking into account various scenarios of different criticality in terms of the applications analyzed. Finally, this study analyzes and discuss the values of the selected metrics applied to the results for each n-tools combination.
Journal Article
Empowering IoV Security: A Novel Secure Cryptographic Algorithm (OpCKEE) for Network Protection in Connected Vehicles
2026
According to Fortune Business Insights, the market share of the Internet of Vehicless is expected to grow from USD 95.62 billion in 2021 to USD 369.61 billion in 2028, at a compound annual growth rate of 21.4%. However, the Internet of Vehicles system still faces several challenges, including regulation, scalability, data management, connectivity, interoperability, privacy, and security. To improve communication security within the Internet of Vehicle system, we have implemented a secure cryptographic algorithm called Optimized Certificateless Key-Encapsulated Encryption, resulting from a fusion of the key-insulated cryptosystem and the cryptographic key-encapsulated mechanism. The formal security analysis of our algorithm using the AVISPA version 1.1 software shows us that our protocol is safe. Informal analysis shows that our algorithm ensures authenticity, confidentiality, integrity, and non-repudiation and resists several other attacks. Our algorithm’s computational and communicational costs are slightly better than those at which it inherits the functionalities.
Journal Article
Risk Takers
by
Marthinsen, John
in
BUSINESS & ECONOMICS / Accounting / Financial
,
BUSINESS & ECONOMICS / Accounting / Managerial
,
BUSINESS & ECONOMICS / E-Commerce / Online Trading
2018
Risk Takers: Uses and Abuses of Financial Derivatives goes to the heart of the arcane and largely misunderstood world of derivative finance and makes it accessible to everyone—even novice readers. Marthinsen takes us behind the scenes, into the back alleyways of corporate finance and derivative trading, to provide a bird’s-eye view of the most shocking financial disasters of the past quarter century. The book draws on real-life stories to explain how financial derivatives can be used to create or to destroy value. In an approachable, non-technical manner, Marthinsen brings these financial derivatives situations to life, fully exploring the context of each event, evaluating their outcomes, and bridging the gap between theory and practice.
Candlestick Charting
by
Thomsett, Michael C
in
BUSINESS & ECONOMICS / Investments & Securities / Options
,
BUSINESS & ECONOMICS / Investments & Securities / Stocks
,
BUSINESS & ECONOMICS / Finance / General
2017,2018
Investors and traders seek methods to identify reversal and continuation to better time their trades.This applies for virtually everyone, whether employing a swing trading strategy, engaging in options trading, or timing entry and exit to spot bull and bear reversals.
Stock Market Math
by
Thomsett, Michael C
in
BUSINESS & ECONOMICS
,
BUSINESS & ECONOMICS / Business Mathematics
,
BUSINESS & ECONOMICS / Investments & Securities / Options
2017
Stock Market Math shows you how to calculate return, leverage, risk, fundamental and technical analysis problems, price, volume, momentum and moving averages, including over 125 formulas and Excel programs for each, enabling readers to simply plug formulas into a spread sheet.
This book is the definitive reference for all investors and traders. It introduces the many formulas and legends every investor needs, and explains their application through examples and narrative discussions providing the Excel spreadsheet programs for each. Readers can find instant answers to every calculation required to pick the best trades for your portfolio, quantify risk, evaluate leverage, and utilize the best technical indicators.
Michael C. Thomsett is a market expert, author, speaker and coach. His many books include Mathematics of Options, Real Estate Investor's Pocket Calculator, and A Technical Approach to Trend Analysis. In Stock Market Math, the author advances the science of risk management and stock evaluation with more than 50 endnotes, 50 figures and tables, and a practical but thoughtful exploration of how investors and traders may best quantify their portfolio decisions.