Ids using reinforcement learning automata for preserving security in cloud environment
P Ghosh, M Bardhan, NR Chowdhury… - International Journal of …, 2017 - igi-global.com
Cloud computing relies on sharing computing resources. With high availability and
accessibility of resources, cloud computing is under the threat of major cyber-attacks. To …
accessibility of resources, cloud computing is under the threat of major cyber-attacks. To …
Smart device authentication based on online handwritten script identification and word recognition in indic scripts using zone-wise features
Secure authentication is a vital component for device security. The most basic form of
authentication is by using passwords. With the evolution of smart devices, selecting stronger …
authentication is by using passwords. With the evolution of smart devices, selecting stronger …
Distributed reconfigurable b approach for the specification and verification of b-based distributed reconfigurable control systems
R Oueslati, O Mosbahi - Advances in Mechanical …, 2017 - journals.sagepub.com
This research article proposes a novel approach called Distributed Reconfigurable B to
specify and verify distributed reconfigurable control systems using B method …
specify and verify distributed reconfigurable control systems using B method …
Symbolic search of insider attack scenarios from a formal information system modeling
A Radhouani, A Idani, Y Ledru, N Ben Rajeb - Transactions on Petri Nets …, 2015 - Springer
The early detection of potential threats during the modelling and design phase of a Secure
Information System is required because it favours the design of a robust access control …
Information System is required because it favours the design of a robust access control …
A Process-Centric Approach to Insider Threats Identification in Information Systems
The development of complex software systems as done today generates countless security
vulnerabilities that are difficult to detect. In this context, several research works have adopted …
vulnerabilities that are difficult to detect. In this context, several research works have adopted …
[PDF][PDF] Extensions du diagramme d'activité pour contrôler l'accès au SI.
L'ouverture des organisations et de leurs Systèmes d'Information (SI) pose le problème de
leur sécurité. La définition d'une politique de contrôle d'accès est l'une des principales …
leur sécurité. La définition d'une politique de contrôle d'accès est l'une des principales …
Formalizing the Relationship between Security Policies and Objectives in Software Architectures
It is difficult to ensure the relationship between the selected security solutions and the
security concerns in software architecture design. Assuring this analysis manually is labor …
security concerns in software architecture design. Assuring this analysis manually is labor …
Extraction of insider attack scenarios from a formal information system modeling
A Radhouani, A Idani, Y Ledru, NB Rajeb - Formal Methods for Security, 2014 - hal.science
The early detection of potential threats during the modelling phase of a Secure Information
System is required because it favours the design of a robust access control policy and the …
System is required because it favours the design of a robust access control policy and the …
A pilot study of a predicate-based vector space model for a biomedical search engine
A search engine that supports finding precise biomedical statements, but also
complementary, and contrasting information would greatly help biomedical researchers. We …
complementary, and contrasting information would greatly help biomedical researchers. We …
Rigorous development of secure architecture within the negative and positive statements: properties, models, analysis and tool support
Q Rouland - 2021 - theses.hal.science
Our society has become more dependent on software-intensive systems, such as
Information and Communication Technologies (ICTs) systems, to perform their daily tasks …
Information and Communication Technologies (ICTs) systems, to perform their daily tasks …