Ids using reinforcement learning automata for preserving security in cloud environment

P Ghosh, M Bardhan, NR Chowdhury… - International Journal of …, 2017 - igi-global.com
Cloud computing relies on sharing computing resources. With high availability and
accessibility of resources, cloud computing is under the threat of major cyber-attacks. To …

Smart device authentication based on online handwritten script identification and word recognition in indic scripts using zone-wise features

R Ghosh, PP Roy, P Kumar - International Journal of Information …, 2018 - igi-global.com
Secure authentication is a vital component for device security. The most basic form of
authentication is by using passwords. With the evolution of smart devices, selecting stronger …

Distributed reconfigurable b approach for the specification and verification of b-based distributed reconfigurable control systems

R Oueslati, O Mosbahi - Advances in Mechanical …, 2017 - journals.sagepub.com
This research article proposes a novel approach called Distributed Reconfigurable B to
specify and verify distributed reconfigurable control systems using B method …

Symbolic search of insider attack scenarios from a formal information system modeling

A Radhouani, A Idani, Y Ledru, N Ben Rajeb - Transactions on Petri Nets …, 2015 - Springer
The early detection of potential threats during the modelling and design phase of a Secure
Information System is required because it favours the design of a robust access control …

A Process-Centric Approach to Insider Threats Identification in Information Systems

A Idani, Y Ledru, G Vega - International Conference on Risks and Security …, 2023 - Springer
The development of complex software systems as done today generates countless security
vulnerabilities that are difficult to detect. In this context, several research works have adopted …

[PDF][PDF] Extensions du diagramme d'activité pour contrôler l'accès au SI.

S Chehida, A Idani, Y Ledru, MK Rahmouni - INFORSID, 2015 - researchgate.net
L'ouverture des organisations et de leurs Systèmes d'Information (SI) pose le problème de
leur sécurité. La définition d'une politique de contrôle d'accès est l'une des principales …

Formalizing the Relationship between Security Policies and Objectives in Software Architectures

Q Rouland, B Hamid, JP Bodeveix… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
It is difficult to ensure the relationship between the selected security solutions and the
security concerns in software architecture design. Assuring this analysis manually is labor …

Extraction of insider attack scenarios from a formal information system modeling

A Radhouani, A Idani, Y Ledru, NB Rajeb - Formal Methods for Security, 2014 - hal.science
The early detection of potential threats during the modelling phase of a Secure Information
System is required because it favours the design of a robust access control policy and the …

A pilot study of a predicate-based vector space model for a biomedical search engine

M Kwak, G Leroy, JD Martinez - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
A search engine that supports finding precise biomedical statements, but also
complementary, and contrasting information would greatly help biomedical researchers. We …

Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support

Q Rouland - 2021 - theses.hal.science
Our society has become more dependent on software-intensive systems, such as
Information and Communication Technologies (ICTs) systems, to perform their daily tasks …