Mining Software Component Interactions to Detect Security Threats at the Architectural Level

Author(s):  
Eric Yuan ◽  
Sam Malek
Author(s):  
Vishnu Sharma ◽  
Vijay Singh Rathore ◽  
Chandikaditya Kumawat

Software reuse can improve software quality with the reducing cost and development time. Systematic reuse plan enhances cohesion and reduces coupling for better testability and maintainability. Software reuse approach can be adopted at the highest extent if relevant software components can be easily searched, adapted and integrated into new system. Large software industries hold their own well managed component libraries containing well tested software component with the project category based classification .Access to these repositories are very limited. Software reuse is facing so many problems and still not so popular. This is due to issues of general access, efficient search and adoption of software component. This paper propose a framework which resolves all of the above issues with providing easy access to components, efficient incremental semantics based search, repository management, versioning of components.


Author(s):  
Himanshi Vashisht ◽  
Sanjay Bharadwaj ◽  
Sushma Sharma

Code refactoring is a “Process of restructuring an existing source code.”. It also helps in improving the internal structure of the code without really affecting its external behaviour”. It changes a source code in such a way that it does not alter the external behaviour yet still it improves its internal structure. It is a way to clean up code that minimizes the chances of introducing bugs. Refactoring is a change made to the internal structure of a software component to make it easier to understand and cheaper to modify, without changing the observable behaviour of that software component. Bad smells indicate that there is something wrong in the code that have to refactor. There are different tools that are available to identify and emove these bad smells. A software has two types of quality attributes- Internal and external. In this paper we will study the effect of clone refactoring on software quality attributes.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


Author(s):  
Oksana Gaiduchok ◽  
◽  
Oleksiy Stupnytskyi ◽  

In modern times, it is believed that by reducing the risk of military intervention, military security has lost its relevance, and economic security has become a priority of national interests. The principle of economic security is as follows: national interests are supported through an economic system that supports free exchange and ensures the upward mobility of the nation. The analysis of economic security is based on the concept of national interests. It is well known that the problem of national security and its components cannot be considered only from the standpoint of current interests; it is closely related to the possibilities of their implementation over a significant, long-term period. Each stage of realization of national interests of the country is characterized by its assessment of its geopolitical, geostrategic and geoeconomic conditions, security threats and the main carriers of these threats, the mechanism of realization of national interests (each of the stages has its own assessment of the main definitions and categories of security, the main vectors of geoeconomic policy). Economic security is the foundation and material basis of national security. A state is in a state of security if it protects its own national interests and is able to defend them through political, economic, socio-psychological, military and other actions. There is a close connection between economic security and the system of national and state interests, and it is through this category that the problems of economic potential and economic power of the state, geopolitical and geoeconomic positions of the country in the modern world are intertwined. At a time when regional forces are trying to expand markets, provide access to finance and the latest technology, economic security has become a necessary component of the ability of regional forces to expand their influence. The article is devoted to the study of economic security of Ukraine and its components using the model of quantitative assessment of economic security of Ukraine. Using the Fishburne method, a model is built that allows to obtain an integrated assessment of the level of economic security based on the synthesis of nine partial indicators.


2019 ◽  
Vol 7 (2) ◽  
pp. 342-348
Author(s):  
Vaishali Singh ◽  
Kavita Bhatia ◽  
S. K. Pandey

Sign in / Sign up

Export Citation Format

Share Document