Biologically Inspired Execution Framework for Vulnerable Workflow Systems
The main objective of the research is to introduce a biologically inspired execution framework for workflow systems under threat due to some intrusion attack. Usually vulnerable systems need to be stop and put into wait state, hence to insure the data security and privacy while being recovered....
| Main Authors: | Safdar, S., Hassan, M.F., Qureshi, M.A, Akhbar, R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LJS Publisher and IJCSIS Press
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/1681/ http://scholars.utp.edu.my/id/eprint/1681/1/IJCIS_2009.rar |
Similar Items
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010)
by: Qureshi, MA., et al.
Published: (2010)
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Moving Towards Two Dimensional Passwords
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Limitations and Measures in Outsourcing Projects to Geographically Distributed Offshore Teams
by: Akhbar, R., et al.
Published: (2010)
by: Akhbar, R., et al.
Published: (2010)
Model for the evaluation of usability of scientific workflows
by: Amelia, Abd Rahman
Published: (2019)
by: Amelia, Abd Rahman
Published: (2019)
Agent based Monitoring Framework for SOA Applications Quality
by: Balfagih, Z., et al.
Published: (2010)
by: Balfagih, Z., et al.
Published: (2010)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for Ad Hoc Network Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
A Survey on Different Interoperability Frameworks of SOA Systems Towards Seamless Interoperability
by: M. Ibrahim, N., et al.
Published: (2010)
by: M. Ibrahim, N., et al.
Published: (2010)
Theoretical Framework of the Effect of Extrinsic Rewards and Individual's Intrinsic Attributes on Knowledge Sharing Behavior
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
Bio-inspired Audio Content-Based Retrieval
Framework (B-ACRF)
by: Muda, N. A.
Published: (2009)
by: Muda, N. A.
Published: (2009)
Framework of Intrinsic and Extrinsic Motivators of Knowledge Sharing: A case of Training Institutes of an Oil and Gas Company in Malaysia
by: Amin, A., et al.
Published: (2010)
by: Amin, A., et al.
Published: (2010)
Vulnerability Detection System (Xposed)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
by: Nurin Azyyati, Kamilizahri
Published: (2023)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
Theoretical Framework of the Effect of Extrinsic Rewards on Individual’s Attitude Towards Knowledge Sharing and the Role of Intrinsic Attributes
by: Amin, A., et al.
Published: (2009)
by: Amin, A., et al.
Published: (2009)
A Framework of universities' smart campus to detect and mitigate vulnerabilities for IoT devices
by: Mazlina, Abdul Majid, et al.
Published: (2023)
by: Mazlina, Abdul Majid, et al.
Published: (2023)
Automated Notification and Document Downloading in E-Learning –
Development of an Agent-Based Framework Utilizing the Push-Pull
Technology Interaction Policy
by: Latif, N.A., et al.
Published: (2008)
by: Latif, N.A., et al.
Published: (2008)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
A Bio-Inspired Music Genre Classification Framework using Modified AIS-Based Classifier
by: Muda, N. A., et al.
Published: (2011)
by: Muda, N. A., et al.
Published: (2011)
Coordinated Constraint Relaxation Using a
Distributed Agent Protocol
by: Hassan, M.F.
Published: (2007)
by: Hassan, M.F.
Published: (2007)
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
by: Ehab Nabiel , Mohammad
Published: (2018)
by: Ehab Nabiel , Mohammad
Published: (2018)
Biologically Inspired Object Recognition System
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
Constraint relaxation to reduce brittleness of distributed agent
protocols
by: Hassan, M.F., et al.
Published: (2004)
by: Hassan, M.F., et al.
Published: (2004)
Quality model for web services from multi-stakeholders' perspective
by: Balfagih, Z., et al.
Published: (2009)
by: Balfagih, Z., et al.
Published: (2009)
Addressing the Brittleness of Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Constraint Relaxation Approach for Over-Constrained Agent Interaction
by: Hassan, M.F., et al.
Published: (2008)
by: Hassan, M.F., et al.
Published: (2008)
Single and Replicated Simulations for Colored Petri Nets Nondeterministic Network
by: Adhipta, D., et al.
Published: (2010)
by: Adhipta, D., et al.
Published: (2010)
A Collaborative-Interaction Model of Software Project Development: An Extension to Agile Based Methodologies
by: Akbar, R., et al.
Published: (2010)
by: Akbar, R., et al.
Published: (2010)
A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
by: Hamada , R. H. Al-Absi, et al.
Published: (2010)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Immunology Inspired Framework for Securing MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Framework for MANETs’ Security
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Performance Analyses of Nature-inspired Algorithms on the Traveling Salesman’s Problems for Strategic Management
by: Julius, Beneoluchi Odili, et al.
Published: (2017)
by: Julius, Beneoluchi Odili, et al.
Published: (2017)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Similar Items
-
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010) -
Two Phase Shortest Path Algorithm for Non-Negative Undirected Graphs
by: Qureshi, MA., et al.
Published: (2010) -
A O(|E|) Time Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010) -
Authentication Model Based on Reformation Mapping Method
by: Safdar, S., et al.
Published: (2010) -
Client’s Perspective: Realization as a New Generation Process for Software Project Development and Management
by: Akbar, R., et al.
Published: (2010)