نتایج جستجو برای: clustring and firewall
تعداد نتایج: 16827414 فیلتر نتایج به سال:
In this paper we discuss the methodology and results of testing the Java Card applet firewall mechanism. The main motivation for this work is the complexity of the firewall. Given the complexity, non-compliance of the cards with respect to the official specification is not unlikely. Firewall implementation faults may lead to serious security issues. Although we did not discover any serious prob...
Firewalls are key security components in computer networks. They filter network traffics based on an ordered list of filtering rules. Firewall configurations must be correct and complete with respect to security policies. Security policy is a set of predicates, which is a high level description of traffic controls. In this paper, we propose an automatic method to verify the correctness of firew...
Dengan perkembangan dunia digital yang terus berkembang, penggunaan teknologi informasi menghasilkan sejumlah besar data berharga, dengan adanya berharga ini membuat perusahaan menyimpannya memiliki risiko terhadap serangan siber. Salah satu ancaman siber umum terjadi adalah SQL Injection dapat memanipulasi hak akses dan menyebabkan kebocoran data, kehilangan ke dalam database. Sehingga organis...
In this paper, we obtain some general results on information retrieval from the black hole interior, based recent progress quantum extremal surface formula and entanglement island. We study an AdS coupled to a bath with generic dynamics, ask whether it is possible retrieve about small perturbation in interior system. derive state reconstruction one norm. However, show that contradiction arises ...
Clustering techniques play an important role in data mining and its related applications. Among the challenging applications that require robust and real-time processing are crowd management and group trajectory applications. In this paper, a robust and low-complexity clustering algorithm is proposed. It is capable of processing data in a manner that is shape and centroid independent. The algor...
Document clustering is the widely researched area because of large amount of rich and dynamic information are available in world wide web. It is the application of cluster analysis to texual documents. There are different applications of document clustering include automatic document organization, data mining , topic extraction and filtering or fast information retrieval. The purpose of this su...
Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is...
Rubin and Greer stated that “The single most important factor of your firewall’s security is how you configure it.” [18]. However, firewall configuration is known to be difficult to get right. In particular domains, such as SCADA networks, while there are best practice standards that help, an overlooked component is the specification of firewall reporting policies. Our research tackles this que...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید