سیویلیکا را در شبکه های اجتماعی دنبال نمایید.

Novel Method to Select Security Patterns Using SVM (Support Vector Machines)

Publish Year: 1388
Type: Conference paper
Language: English
View: 1,871

This Paper With 6 Page And PDF Format Ready To Download

Export:

Link to this Paper:

Document National Code:

ISCC06_010

Index date: 7 July 2010

Novel Method to Select Security Patterns Using SVM (Support Vector Machines) abstract

Over the last few years a large number of security patterns have been published. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we used text processing approach in conjunction with a learning technique to select appropriate security patterns for a given security problem. In the proposed method, for each security pattern class, one classifier is learned, then suitable security patterns are recommended for a given security requirement. We used SVM learning technique for creating classifiers. We also evaluated our proposed method by several security patterns mentioned in Schumacher's book.

Novel Method to Select Security Patterns Using SVM (Support Vector Machines) Keywords:

Novel Method to Select Security Patterns Using SVM (Support Vector Machines) authors

Seyed Mohammad Hossein Hasheminejad

Dep. of Electrical and Computer Engineering

Saeed Jalili

Dep. of Electrical and Computer Engineering

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
E. B. Fernandez, H. Washizaki, N. Yoshioka, A. Kubo, and ...
M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. ...
J. Yoder and J Barcalow, "Architectural patterns for enabling application ...
E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design ...
D. G. Rosado, E. Fernan dez-Medina, M. Piattini, and C. ...
A Novel Method t _ _ _ [15] D. G. ...
N. Yoshioka, H. Washizaki, and K. Maruyama, "A survey on ...
A. Kubo, H. Washizaki, and Y. Fukazawa, "Extracting Relations among ...
A. Kubo, H. Washizaki, A. Takasu, and Y. Fukazawa, "Extracting ...
F. Sebastiani, "Machine learning in automated tex categorization, " Journal ...
M. F. Porter, "An algorithm for suffix stripping, " Program: ...
A. Hotho, A. Nirnberger, and G. PaaB, "A Brief Survey ...
"Java Programs for Machine Learning, University of Waikato, " in ...
IJCSNS International Journal of Computer Science and Network Security, vol. ...
M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann, Security ...
T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, "An ...
P. E. Khoury, A. Mokhtari, E. Coquery, and M. S. ...
(DEXAO8), 2008, pp. 297-301. ...
M. Weiss and H. Mouratidis. "Selecting Security Patterns that Fulfill ...
F. Buschmann, P attern-oriented software architecture: _ system of patterns: ...
S. Konrad, B. H. C. Cheng, L. A. Campbell, and ...
D. M. Kienzle, M. C. Elder, D. Tyree, and J. ...
http://www. scrvpt. net/- c eler/s ec uritypatterns/, 2002. ...
B. Blakley and C. Heath, "Members of the Open Group ...
M. Hafiz, P. Adamczyk, and R. E. Johnson, "Organizing security ...
نمایش کامل مراجع