The paper deals with the problem of detection of imperfections of software quality evaluation. Existing currently models and methods of the software quality evaluation weakly take into account the systemic aspect of m...
详细信息
The paper deals with the problem of detection of imperfections of software quality evaluation. Existing currently models and methods of the software quality evaluation weakly take into account the systemic aspect of modern software, including they pay insufficient attention to emergent properties of software. Analysis of the known approaches of software emergent properties detection showed that nowadays these approaches are theoretical and only explain the nature of emergent properties. But these appoaches don't provide the prediction of the emergence and evaluation of the influence of emergent properties in the software system. So the methodologies of software quality evaluation require the significant development in part of detection, evaluation and prediction of emergent properties, and also in the part of full consideration of the subject domain information at the different stages of the software life cycle.
This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (A...
详细信息
This paper represents the artificial neural network's method of design results evaluation and software quality characteristics prediction (NMEP) and the analysis of results of realized artificial neural network (ANN) training and functioning.
The article focuses on the problem of software security assurance. The place of source code security analysis in the software lifecycle was considered. Results of common tools for C and C++ source code static analysis...
详细信息
The article focuses on the problem of software security assurance. The place of source code security analysis in the software lifecycle was considered. Results of common tools for C and C++ source code static analysis were investigated. Effectiveness of source code security analysis applying was researched.
A new DNS-based anti-evasion technique for botnets detection is proposed. It is based on a cluster analysis of the features obtained from the payload of DNS-messages. The method uses a semi-supervised fuzzy c-means cl...
详细信息
A new DNS-based anti-evasion technique for botnets detection is proposed. It is based on a cluster analysis of the features obtained from the payload of DNS-messages. The method uses a semi-supervised fuzzy c-means clustering. Usage of the developed method makes it possible to detect botnets that use the DNS-based evasion techniques with high efficiency.
Epilepsy is a medical problem that tackles lots of patients. It limits the life activity of such patients due to the seizures that occur anytime and anywhere. Thus, creating a monitoring system that could make their l...
详细信息
This paper proves the dependence of successful of software project implementation on the software requirements specification (SRS), the actuality and importance of the skill to evaluate the possible success of softwar...
详细信息
This paper proves the dependence of successful of software project implementation on the software requirements specification (SRS), the actuality and importance of the skill to evaluate the possible success of software project based on the specifications. The neural network model of prediction of the software project characteristics for evaluating the success of its implementation based on analysis of specifications is first time proposed and implemented in Matlab.
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well a...
详细信息
Safety-related systems mostly comprise hardware and software solutions. Due to the increasing application of complex hardware and software systems, the software systems have to be considered regarding safety as well as hardware systems. The development of a safety-related software system is similar to the development of a safety-related hardware systems. But there are still no generally accepted methods for developing safety-critical software. One has to use the methods, which fit best to the actual requirements. However, the calculation of reliability and availability for safety-related software systems is far more complex.
A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that allowed to make botnet detection via agent...
详细信息
A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that allowed to make botnet detection via agents' communication within corporate network. A new technique with the usage of fuzzy and neural-fuzzy systems that makes the conclusion about botnet presence degree in computer systems is developed. The analysis of the botnets' actions demonstrations in the situation of the intentionally computer system reconnection is performed. It takes into account the botnet demonstrations in the several computer systems which are available in the network.
Logistic Regression (LR) is a widely used statistical model for classification problems. However, its training and evaluation in a shared environment increase the possibility of information leaking. A federated LR red...
详细信息
A description of a newly developed implementation of the Particle Finite Element Method, 2nd generation (PFEM-2) is given. Main steps of the FEM and particles' parts of the algorithm are outlined. The results of i...
详细信息
暂无评论