Novel Method to Select Security Patterns Using SVM (Support Vector Machines)

Publish Year: 1388
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,779

This Paper With 6 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCC06_010

تاریخ نمایه سازی: 16 تیر 1389

Abstract:

Over the last few years a large number of security patterns have been published. However, this large number of patterns has created a problem in selecting patterns that are appropriate for different security requirements. In this paper, we used text processing approach in conjunction with a learning technique to select appropriate security patterns for a given security problem. In the proposed method, for each security pattern class, one classifier is learned, then suitable security patterns are recommended for a given security requirement. We used SVM learning technique for creating classifiers. We also evaluated our proposed method by several security patterns mentioned in Schumacher's book.

Authors

Seyed Mohammad Hossein Hasheminejad

Dep. of Electrical and Computer Engineering

Saeed Jalili

Dep. of Electrical and Computer Engineering

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • E. B. Fernandez, H. Washizaki, N. Yoshioka, A. Kubo, and ...
  • M. R. Barbacci, R. Ellison, A. J. Lattanze, J. A. ...
  • J. Yoder and J Barcalow, "Architectural patterns for enabling application ...
  • E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design ...
  • D. G. Rosado, E. Fernan dez-Medina, M. Piattini, and C. ...
  • A Novel Method t _ _ _ [15] D. G. ...
  • N. Yoshioka, H. Washizaki, and K. Maruyama, "A survey on ...
  • A. Kubo, H. Washizaki, and Y. Fukazawa, "Extracting Relations among ...
  • A. Kubo, H. Washizaki, A. Takasu, and Y. Fukazawa, "Extracting ...
  • F. Sebastiani, "Machine learning in automated tex categorization, " Journal ...
  • M. F. Porter, "An algorithm for suffix stripping, " Program: ...
  • A. Hotho, A. Nirnberger, and G. PaaB, "A Brief Survey ...
  • "Java Programs for Machine Learning, University of Waikato, " in ...
  • IJCSNS International Journal of Computer Science and Network Security, vol. ...
  • M. Schumacher, E. Fernandez, D. Hybertson, and F. Buschmann, Security ...
  • T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, "An ...
  • P. E. Khoury, A. Mokhtari, E. Coquery, and M. S. ...
  • (DEXAO8), 2008, pp. 297-301. ...
  • M. Weiss and H. Mouratidis. "Selecting Security Patterns that Fulfill ...
  • F. Buschmann, P attern-oriented software architecture: _ system of patterns: ...
  • S. Konrad, B. H. C. Cheng, L. A. Campbell, and ...
  • D. M. Kienzle, M. C. Elder, D. Tyree, and J. ...
  • http://www. scrvpt. net/- c eler/s ec uritypatterns/, 2002. ...
  • B. Blakley and C. Heath, "Members of the Open Group ...
  • M. Hafiz, P. Adamczyk, and R. E. Johnson, "Organizing security ...
  • نمایش کامل مراجع