نتایج جستجو برای: clustring and firewall

تعداد نتایج: 16827414  

2007
Wojciech Mostowski Erik Poll

In this paper we discuss the methodology and results of testing the Java Card applet firewall mechanism. The main motivation for this work is the complexity of the firewall. Given the complexity, non-compliance of the cards with respect to the official specification is not unlikely. Firewall implementation faults may lead to serious security issues. Although we did not discover any serious prob...

2008
Soutaro Matsumoto Adel Bouhoula

Firewalls are key security components in computer networks. They filter network traffics based on an ordered list of filtering rules. Firewall configurations must be correct and complete with respect to security policies. Security policy is a set of predicates, which is a high level description of traffic controls. In this paper, we propose an automatic method to verify the correctness of firew...

Journal: :MISI (Jurnal Manajemen Informatika dan Sistem Informasi) 2023

Dengan perkembangan dunia digital yang terus berkembang, penggunaan teknologi informasi menghasilkan sejumlah besar data berharga, dengan adanya berharga ini membuat perusahaan menyimpannya memiliki risiko terhadap serangan siber. Salah satu ancaman siber umum terjadi adalah SQL Injection dapat memanipulasi hak akses dan menyebabkan kebocoran data, kehilangan ke dalam database. Sehingga organis...

Journal: :Journal of Intelligent Systems: Theory and Applications 2020

Journal: :International Journal of Computer Applications 2012

Journal: :Journal of High Energy Physics 2022

In this paper, we obtain some general results on information retrieval from the black hole interior, based recent progress quantum extremal surface formula and entanglement island. We study an AdS coupled to a bath with generic dynamics, ask whether it is possible retrieve about small perturbation in interior system. derive state reconstruction one norm. However, show that contradiction arises ...

Journal: :CoRR 2016
Yasser M. Seddiq A. A. Alharbiy Moayyad Hamza Ghunaim

Clustering techniques play an important role in data mining and its related applications. Among the challenging applications that require robust and real-time processing are crowd management and group trajectory applications. In this paper, a robust and low-complexity clustering algorithm is proposed. It is capable of processing data in a manner that is shape and centroid independent. The algor...

2015
JITENDRA AGRAWAL SHIKHA AGRAWAL SAUMYA AGRAWAL SANJEEV SHARMA

Document clustering is the widely researched area because of large amount of rich and dynamic information are available in world wide web. It is the application of cluster analysis to texual documents. There are different applications of document clustering include automatic document organization, data mining , topic extraction and filtering or fast information retrieval. The purpose of this su...

2010
Raja Naeem Akram Konstantinos Markantonakis Keith Mayes

Multi-application smart card technology facilitates applications to securely share their data and functionality. The security enforcement and assurance in application sharing is provided by the smart card firewall. The firewall mechanism is well defined and studied in the Issuer Centric Smart Card Ownership Model (ICOM), in which a smart card is under total control of its issuer. However, it is...

2015
Dinesha Ranathunga Matthew Roughan Phil Kernick Nickolas J. G. Falkner

Rubin and Greer stated that “The single most important factor of your firewall’s security is how you configure it.” [18]. However, firewall configuration is known to be difficult to get right. In particular domains, such as SCADA networks, while there are best practice standards that help, an overlooked component is the specification of firewall reporting policies. Our research tackles this que...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید