The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of ...
详细信息
The paper presents a new technique for the botnets' detection in the corporate area networks. It is based on the usage of the algorithms of the artificial immune systems. Proposed approach is able to distinguish b...
详细信息
A new technique for the DDoS botnet detection based on the botnets network features analysis is proposed. It uses the semi-supervised fuzzy c-means clustering. The proposed approach includes the learning and the detec...
详细信息
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of th...
详细信息
ISBN:
(纸本)9781728140704
The paper deals with the development of the method of activity and the realization of the intelligent agent (IA) for semantic analysis of the natural language software requirements. This IA performs the analysis of the requirements, determines the number and percentage of missing indicators for determining the metrics of complexity and quality of software, displays which indicators are missing for each metric, and also forms the real ontology of the domain "Software engineering" (part "Quality and complexity of software. Metric analysis"). During an experiment, which is conducted with the help of the realized IA, the semantic analysis of requirements for the Internet of Things (IoT)-system was performed. Such analysis provides an increase of the volume and ensures of the sufficiency of metric information in the software requirements, which, in turn, provides an improvement in the quality of the software of IoT-system.
Nowadays in Ukraine, there is a need for automation and removal of human from the processes of decision making on civil law regulation of contract for the provision of in vitro fertilization, which can significantly i...
详细信息
The development of multi-cloud systems with an acceptable level of service delays that significantly affect the quality of the end-users experience is an open research problem, for which simulation is successfully use...
详细信息
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of ...
详细信息
The aim of this study is the development of the method of generating and filling the template of ontology for the quality of the concrete software and method of forming the logical conclusion about the sufficiency of information of software requirements specification (SRS) for software quality assessment (by ISO 25010:2011). The first time proposed method of generating and filling the template of ontology for the quality of the concrete software leaves in the relevant ontology only measures, which are available in the SRS for the concrete software. It provides forming the ontology for the quality of the concrete software. The first time developed method of forming the logical conclusion about the sufficiency of the SRS information for software quality assessment provides the conclusion about the sufficiency or insufficiency of the SRS information for software quality assessment by ISO 25010:2011. If the SRS information is insufficient, this method: provides the conclusion for which characteristics and sub-characteristics the information is insufficient; creates the sorted list of missing measures as the recommended priority of their addition in the SRS; evaluates the veracity of software quality assessment based on the available in the SRS measures.
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on ...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
An article presents an approach for cyberattack detection based on genetic algorithms is presented. The method allows detecting both known and unknown cyberattacks. The method has the heuristic nature and is based on the collected data about the cyberattacks. It makes it possible to give an answer about the cyberattacks' existence in the computer networks and its hosts. Developed attack detection approach consists of training and detection stages. The mechanism of attack detection system is based on the cyberattacks' features gathering from network or hosts, extracting the subset of acquired set and generation the attacks' detection rules. Genetic algorithms are used for the minimization of the feature set, which allows effective using of the system resources for attacks detection. In order to detect the attacks, the proposed technique involves the rule generation. The attacks' features are described by the set of sub-rules. It is suggested to use the feature with the smallest domain for generating the minimal set for rules. It is possible to select the optimal feature after all selected features which were discovered while applying the genetic algorithm. The sub-rule set is used with the aim to reduce false positive rate.
暂无评论