Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] An empirical evaluation of classification algorithms for fault prediction in open source projects
A Kaur, I Kaur - Journal of King Saud University-Computer and …, 2018 - Elsevier
Creating software with high quality has become difficult these days with the fact that size and
complexity of the developed software is high. Predicting the quality of software in early …
complexity of the developed software is high. Predicting the quality of software in early …
[PDF][PDF] Automata-Based Study of Dynamic Access Control Policies.
Access control policies (more briefly: policies) are used to filter accesses to resources. A
policy is usually defined by a table of rules that specify which access requests (more briefly …
policy is usually defined by a table of rules that specify which access requests (more briefly …
[HTML][HTML] A formal basis for the design and analysis of firewall security policies
A Khoumsi, M Erradi, W Krombi - Journal of King Saud University-Computer …, 2018 - Elsevier
A firewall is the core of a well defined network security policy. This paper presents an
automata-based method to study firewall security policies. We first propose a procedure that …
automata-based method to study firewall security policies. We first propose a procedure that …
An efficient hybrid deep learning approach for internet security
F Ertam - Physica A: Statistical Mechanics and Its Applications, 2019 - Elsevier
Nowadays, internet is mostly used communication tool worldwide. However, the major
problem of the internet is to provide security. To provide internet security, many researches …
problem of the internet is to provide security. To provide internet security, many researches …
A model-driven approach for the extraction of network access-control policies
Network security constitutes a critical concern when develo** and maintaining nowadays
corporate information systems. Firewalls are a key element of network security by filtering …
corporate information systems. Firewalls are a key element of network security by filtering …
Model-driven extraction and analysis of network security policies
Firewalls are a key element in network security. They are in charge of filtering the traffic of
the network in compliance with a number of access-control rules that enforce a given …
the network in compliance with a number of access-control rules that enforce a given …
Automating Network Perimeter Threat Prevention for Decentralized Network Administration
N Wintering, E Lanfer… - 2024 20th International …, 2024 - ieeexplore.ieee.org
Decentrally administered networks consist of a plethora of hosts providing various services
to the Internet and several administrators are responsible for mitigating software …
to the Internet and several administrators are responsible for mitigating software …
Protecting services from security mis-configuration
N Hadaad, L Drury, RG Addie - … Networks and Applications …, 2015 - ieeexplore.ieee.org
It is understood that ICT security can be defined and enforced through rules. In this paper,
the concept of rules which define and ensure users' access to services is introduced …
the concept of rules which define and ensure users' access to services is introduced …
YENİ BİR AĞ GÜVENLİĞİ YAKLAŞIMI: DİNAMİK ZEKİ GÜVENLİK DUVARI MİMARİSİ
OA Erdem, R Kocaoğlu - Gazi Üniversitesi Mühendislik Mimarlık …, 2014 - dergipark.org.tr
Bu makalede, geleneksel güvenlik duvarı mimarilerinden tamamen farklı, yeni bir güvenlik
duvarı mimarisi geliştirilmiştir. Geliştirilen mimari DIFA (Dynamic Intelligent Firewall …
duvarı mimarisi geliştirilmiştir. Geliştirilen mimari DIFA (Dynamic Intelligent Firewall …
Automatic reconstruction and analysis of security policies from deployed security components
S Martínez - 2014 - theses.hal.science
Security is a critical concern for any information system. Security properties such as
confidentiality, integrity and availability need to be enforced in order to make systems safe …
confidentiality, integrity and availability need to be enforced in order to make systems safe …