A fuzzy-based technique for describing security requirements of intrusion tolerant systems
To care for security in early stages of software development has always been a major engineering trend. However, due to the existence of unpreventable and accidental security faults within the system, it is not always possible to entirely identify and mitigate the security threats. This may eventua...
| Main Authors: | Mougouei, Davoud, Wan Ab. Rahman, Wan Nurhayati |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science & Engineering Research Support Society
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30570/ http://psasir.upm.edu.my/id/eprint/30570/1/A%20fuzzy.pdf |
Similar Items
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012)
by: Mougouei, Davoud, et al.
Published: (2012)
A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
by: Mougouei, Davoud, et al.
Published: (2012)
by: Mougouei, Davoud, et al.
Published: (2012)
An intrusion tolerant system architecture for secure and self-healing smart grid control centers
by: Tanha, Maryam
Published: (2013)
by: Tanha, Maryam
Published: (2013)
Describing the work requirements of entry-level dietitians
by: Begley, Andrea
Published: (2019)
by: Begley, Andrea
Published: (2019)
Towards a secure and available smart grid using intrusion tolerance.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
S-Scrum: a secure methodology for agile development of web services
by: Mougouei, Davoud, et al.
Published: (2013)
by: Mougouei, Davoud, et al.
Published: (2013)
Fuzzy set conjoint model in describing students’ perceptions on computer algebra system learning environment
by: Abdullah, Mohd Lazim, et al.
Published: (2011)
by: Abdullah, Mohd Lazim, et al.
Published: (2011)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
Intrusion detection security system with IOT sensors
by: Chean, Vernon Lynn Chii
Published: (2021)
by: Chean, Vernon Lynn Chii
Published: (2021)
An intrusion tolerant system for improving availability in smart grid control centers.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Anomaly-based intrusion detection using fuzzy rough clustering
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Describing and Interacting with Functional, Symbolic and Semantic Systems
by: Aitken, Ashley
Published: (2012)
by: Aitken, Ashley
Published: (2012)
A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud
by: Farid, Mazen, et al.
Published: (2021)
by: Farid, Mazen, et al.
Published: (2021)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
The use of intrusion prevention system to increase computer security / Najib Limun
by: Limun, Najib
Published: (2005)
by: Limun, Najib
Published: (2005)
Biological Inspired Intrusion Prevention and Self-healing System for Network Security Based on Danger Theory
by: Muna, Elsadig, et al.
Published: (2009)
by: Muna, Elsadig, et al.
Published: (2009)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Differential games described by infinite system of differential equations
by: Mat Hasim, Risman
Published: (2014)
by: Mat Hasim, Risman
Published: (2014)
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A generic framework for e-commerce requirements to comply with Sharia in business-to-consumer perspective
by: Ribadu, Mohammed Bashir, et al.
Published: (2016)
by: Ribadu, Mohammed Bashir, et al.
Published: (2016)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
Systematic review of intrusion detection system based on machine learning techniques for internet of things
by: Idris, Muhammad, et al.
Published: (2023)
by: Idris, Muhammad, et al.
Published: (2023)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Sharia compliance requirements framework for e-commerce systems: an exploratory study
by: Ribadu, Mohammed Bashir, et al.
Published: (2020)
by: Ribadu, Mohammed Bashir, et al.
Published: (2020)
Embryonic Development and Nutritional Requirements of Kutum Fry, Rutilus Frisii Kutum
by: Haghighi, Davoud Talebi
Published: (2006)
by: Haghighi, Davoud Talebi
Published: (2006)
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
by: Ahmad Zainaddin, Dahlia Asyiqin, et al.
Published: (2013)
A comparative study of different fuzzy classifiers for cloud intrusion detection systems' alerts
by: Alqahtani, Saeed M., et al.
Published: (2016)
by: Alqahtani, Saeed M., et al.
Published: (2016)
A review of the advances in cyber security benchmark datasets for evaluating data-driven based intrusion detection systems
by: Ibrahim, Adamu Abubakar, et al.
Published: (2015)
by: Ibrahim, Adamu Abubakar, et al.
Published: (2015)
Discovering plain-text-described services based on ontology learning
by: Dong, Hai, et al.
Published: (2014)
by: Dong, Hai, et al.
Published: (2014)
Intrusion detection system : a step ahead in protecting e-commerce security infrastucture
by: Zakaria, Nur Haryani
Published: (2002)
by: Zakaria, Nur Haryani
Published: (2002)
A SCM framework to describe CRM
by: P.D.D., Dominic, et al.
Published: (2008)
by: P.D.D., Dominic, et al.
Published: (2008)
Characteristics of the arthropathy described in hereditary hemochromatosis
by: Carroll, G., et al.
Published: (2012)
by: Carroll, G., et al.
Published: (2012)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Similar Items
-
Fuzzy description of security requirements for intrusion tolerant web-services
by: Mougouei, Davoud, et al.
Published: (2013) -
Evaluating fault tolerance in security requirements of web services.
by: Mougouei, Davoud, et al.
Published: (2012) -
A goal-based modeling approach to develop security requirements of fault tolerant security-critical systems
by: Mougouei, Davoud, et al.
Published: (2012) -
An intrusion tolerant system architecture for secure and self-healing smart grid control centers
by: Tanha, Maryam
Published: (2013) -
Describing the work requirements of entry-level dietitians
by: Begley, Andrea
Published: (2019)