فیلترها/جستجو در نتایج    

فیلترها

سال

بانک‌ها




گروه تخصصی











متن کامل


اطلاعات دوره: 
  • سال: 

    1382
  • دوره: 

    5
تعامل: 
  • بازدید: 

    234
  • دانلود: 

    87
چکیده: 

با رشد و توسعه روز افزون شرکت ها، حجم انبوهی از اطلاعات روزانه تولید می گردد. دسترسی آسان، امنیت بالا، دسته بندی و در دسترس بودن اطلاعات همواره مد نظر تمامی شرکت ها می باشد. از آن رو که از شرکتها معمولا از برنامه های متفاوتی استفاده می کنند، یکسان سازی محیطی جهت استفاده از تمامی نرم افزارهای شرکت بسیار حایز اهمیت میباشد. در ادامه به بررسی در مورد تکنولوژی Portal و اهمیت آن در صنایع دریایی پرداخته می شود.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 234

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 87
اطلاعات دوره: 
  • سال: 

    2011
  • دوره: 

    2
  • شماره: 

    3 (5)
  • صفحات: 

    1-13
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    465
  • دانلود: 

    0
چکیده: 

Requirements engineering (RE) is often seen as an essential facet in software development. It is a vital process before each project starts. In the context of systems engineering, an understanding and Application of systems theory and practice is also relevant to RE. The contexts in which RE takes place habitually involve human activities. Therefore, RE needs to be sensitive to how people perceive and understand the world around them, how they interact, and how the sociology of the workplace affects their actions. This paper will propose a new approach in requirements elicitation process by considering the human intervention in each activity involve with the development process. Web Application development requires proper elicitation process because it has its own distinctive features.Without proper elicitation process, the requirements will turn to be inaccurate and incomplete thus will increase the ambiguity. Therefore, this paper will examine the role of the activity theory in order to decrease the impact of the said problems or to avoid them. Some analysis will be made over the theory in order to discover its sustainability in promoting and maintaining the quality of the requirements, with the aim to underline better way of eliciting the requirements for the Web Application.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 465

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

HEMMATI MOJTABA | HADAVI MOHAMMAD ALI

اطلاعات دوره: 
  • سال: 

    2022
  • دوره: 

    14
  • شماره: 

    2
  • صفحات: 

    131-145
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    125
  • دانلود: 

    0
چکیده: 

Web Application rewalls (WAFs) are used for protecting Web Applications from attacks such as SQL injection, cross-site request forgery, and cross-site scripting. As a result of the growing complexity of Web attacks, WAFs need to be tested and updated on a regular basis. There are various tools and techniques to verify the correct performance of a WAF. But most of the techniques are manual or use brute-force attacks, so su er from poor e cacy. In this work, we propose a solution based on Reinforcement Learning (RL) to discover malicious payloads, which are able to bypass WAFs. We provide an RL framework with an environment compatible with OpenAI gym toolset standards. The environment is employed for training agents to implement WAF circumvention tasks. The agent mutates the syntax of a malicious payload using a set of modi cation operators as actions, without changes to its semantic. Then, upon WAF's reaction to the payload, the environment ascertains a reward for the agent. Eventually, based on these rewards, the agent learns a suitable sequence of mutations for any malicious payload. The payloads, which bypass the WAF determine rules defects, which can be further used in rule tuning for rule-based WAFs. Also, it can enrich the machine learning-based WAFs datasets for retraining. We use Q-Learning, Advantage Actor-Critic (A2C), and Proximal Policy Optimization (PPO) algorithms with the deep neural network. Our solution is successful in evading signature-based and machine learning-based WAFs. While our focus in this work is on SQL injection, the method can be simply extended to use for any string-based injection attacks.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 125

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
نویسندگان: 

Fadlil A. | Riadi I. | Mumin M.A.

اطلاعات دوره: 
  • سال: 

    2024
  • دوره: 

    37
  • شماره: 

    4
  • صفحات: 

    635-645
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    4
  • دانلود: 

    0
چکیده: 

SQL injection (SQLi) is one of the most common attacks against database servers and has the potential to threaten server services by utilizing SQL commands to change, delete, or falsify data. In this study, researchers tested SQLi attacks against Websites using a number of tools, including Whois, SSL Scan, Nmap, Open Web Application Security Project (OWASP) Zap, and SQL Map. Then, researchers identified SQLi vulnerabilities on the tested Web server. Next, researchers developed and implemented mitigation measures to protect the Website from SQLi attacks. Test results using OWASP Zap identified 14 vulnerabilities, with five of them at a medium level of 35%, seven at a low level of 50%, and two at an informational level of 14%. Meanwhile, testing using SQL Map succeeded in gaining access to the database and username on the Web server. The next step in this research is to provide recommendations for installing a firewall on the Website as a mitigation measure to reduce the risk of SQLi attacks. The main contribution of this research is the development of a structured methodology to identify and address SQLi vulnerabilities in Web servers, which play an important role in maintaining data security and integrity in a rapidly evolving online environment.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 4

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
اطلاعات دوره: 
  • سال: 

    2018
  • دوره: 

    4
تعامل: 
  • بازدید: 

    199
  • دانلود: 

    0
چکیده: 

DUE TO THE GROWING GROWTH OF Web ApplicationS AND THE TENDENCY TO USE THEM IN MOST CATEGORIES, ESPECIALLY THE MOST IMPORTANT INDUSTRIES, FINANCIAL, COMMERCIAL AND INFORMATIONAL AREAS, THE CHALLENGE OF SECURITY IS HIGHLIGHTED IN GREAT DETAIL. BY PRACTICING SECURITY THINKING AT DIFFERENT STAGES OF DESIGNING AND PRODUCING Web-BASED SOFTWARE, THIS CAN BE SOMEWHAT ACHIEVED, BUT CERTAINLY NOT ENOUGH. Web ApplicationS FIREWALLS ARE PROFESSIONAL TOOLS THAT CAN PROTECT SOFTWARES IN THIS AREA AGAINST VARIOUS SECURITY CHALLENGES AND PREVENT DATA BEING STOLEN OR SERVICES INACCESSIBLE.IN THIS PAPER, DESCRIBING THE SECURITY CHALLENGES AHEAD IN THE FIELD OF Web ApplicationS, THE FIREWALLS WILL BE INTRODUCED IN 2017 AND COMPARED BRIEFLY.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 199

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
نویسنده: 

Keyhanipour Amir Hosein

اطلاعات دوره: 
  • سال: 

    2019
  • دوره: 

    5
تعامل: 
  • بازدید: 

    165
  • دانلود: 

    0
چکیده: 

DATA ABOUT THE BEHAVIOR OF Web USERS WHILE BROWSING THE RESULTS RETURNED BY Web SEARCH ENGINES ENTITLED “ CLICK-THROUGH DATA” , IS A SOURCE OF IMPORTANT INFORMATION, WHICH IMPROVES THE FUNCTIONALITY OF Web SEARCH ENGINES. MEANWHILE, ALMOST NONE OF THE RELEASED AND PUBLICLY AVAILABLE BENCHMARK DATASETS DEVOTED TO THE TASK OF LEARNING TO RANK, INCLUDE EXPLICIT CLICK-THROUGH DATA. AS A RESULT, MOST OF THE PROPOSED LEARNING TO RANK ALGORITHMS, IN PRACTICE HAVE NOT USED SUCH ENRICHED SOURCE OF DATA IN THEIR RANKING PROCESS. BESIDES, THESE DATASETS PRESENT A LARGE VOLUME OF FEATURES FOR THE TASK OF LEARNING TO RANK WHICH IN TURN BRINGS OUT NOTICEABLE COMPUTATIONAL COSTS FOR THE PROPOSED ALGORITHMS, AND MAKES THEM INEFFECTIVE IN REAL-WORLD SITUATIONS. TO ADDRESS THESE PROBLEMS, A NOVEL LEARNING TO RANK METHOD, QRC-RANK, HAS PROPOSED THE CONCEPT OF “ CLICK-THROUGH FEATURES” . IN THIS RESEARCH, THE FUNCTIONALITY OF THESE RANKING TECHNIQUES IS STUDIED IN THE RETRIEVAL OF THE PERSIAN CONTENTS BY APPLYING ON DOTIR BENCHMARK DATASET. THESE ANALYZES CLEARLY DEMONSTRATE SIGNIFICANT IMPROVEMENTS IN COMPARISON WITH WELL-KNOWN RANKING METHODS BASED ON THE EVALUATION CRITERIA. SPECIFICALLY, SUCH AN IMPROVEMENT IS MORE NOTICEABLE ON THE TOP OF RANKED LISTS, WHICH USUALLY ATTRACT USERS’ ATTENTIONS MORE THAN OTHER PARTS OF THESE LISTS.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 165

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
اطلاعات دوره: 
  • سال: 

    1397
  • دوره: 

    4
تعامل: 
  • بازدید: 

    829
  • دانلود: 

    412
چکیده: 

لطفا برای مشاهده چکیده به متن کامل (PDF) مراجعه فرمایید.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 829

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 412
اطلاعات دوره: 
  • سال: 

    2019
  • دوره: 

    11
  • شماره: 

    3
  • صفحات: 

    49-56
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    237
  • دانلود: 

    0
چکیده: 

Web Application Firewall (WAF) is known as one of the Intrusion Detection System (IDS) solutions for protecting Web servers from HTTP attacks. WAF is a tool to identify and prevent many types of attacks, such as XSS and SQL-injection. In this paper, deep machine learning algorithms are used for enriching the WAF based on the anomaly detection method. Firstly, we construct attributes from HTTP data, to do so we consider two models namely n-gram and one-hot. Then, according to Auto-Encoder LSTM (AE-LSTM) as an unsupervised deep leaning method, we should extract informative features and then reduce them. Finally, we use ensemble isolation forest to train only normal data for the classifier. We apply the proposed model on CSIC 2010 and ECML/ PKDD 2007 datasets. The results show AE-LSTM has higher performance in terms of accuracy and generalization compared with naï ve methods on CSIC dataset; the proposed method also have acceptable detection rate on ECML/PKDD dataset using n-gram model.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 237

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

Rahnamoun Rashin | Rahnamoun Romina

اطلاعات دوره: 
  • سال: 

    2023
  • دوره: 

    6
  • شماره: 

    1
  • صفحات: 

    39-48
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    31
  • دانلود: 

    0
چکیده: 

L-Atur is a Web Application with the essence of human and machine collaboration that assists users who don't have coding or design skills to generate their customized products. We noticed that our previous version only supported small-scale designs properly, and the generated shapes didn't provide enough visual complexity for large-scale results. In this paper, we improved the supported grammatical properties in order to expand design variations. We offered random and specified color choices, variable line thickness, and multi-rule L-systems grammars as the new options for the current version of L-Atur. We also provided an in-depth analysis of how these new suggested properties can have fundamental impacts on the generated designs visually. We also discussed grammatical evolution as a solution to improve grammatical diversity by using machine-generated ones. As a result, the current version can cover broadened design aspects ranging from small-scale products to large ones with diverse levels of complexity and a high level of visual novelty.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 31

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
نویسندگان: 

RAMEZANI KEBRIA H. | AKBARI BENGAR R.

اطلاعات دوره: 
  • سال: 

    2009
  • دوره: 

    4
  • شماره: 

    2
  • صفحات: 

    15-23
تعامل: 
  • استنادات: 

    0
  • بازدید: 

    322
  • دانلود: 

    0
چکیده: 

Large-scale production of Nano fibres requires quality control. Uniformity in fibrous structures plays an important role in defining appearance, performance, etc. For example, in filtration processes, Web performance is largely dependent on the uniformity of the Web. In this paper, image analysis method based on mottle and graininess algorithms for Nano-Web uniformity measurement was proposed. An appropriate computer program based on ISO-13660 standard mottle and graininess algorithms was developed and uniformity of the Black and White images were measured. Image processing algorithm is applied on two types of images: simulated and real Nano-Web images. The result indicates that the attempt to use the mottle and graininess algorithms for determining Nano-Web uniformity measurement has been successful. Also, inverse of graininess are reasonably good in evaluatinguniformity of Nano-Web. This method has capability of being used as on-line technique for quality control of Nano-Web uniformity.

شاخص‌های تعامل:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

بازدید 322

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesدانلود 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesاستناد 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resourcesمرجع 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button