-
آرشیو :
نسخه زمستان 1399
-
نوع مقاله :
پژوهشی
-
موضوع :
مهندسی نرم افزار
-
نویسنده/گان :
مریم مجاوری، حنانه صالحی فر، منصور اسماعیل زاده
-
کلید واژه :
امنیت و کیفیت سرویس - الگوریتم رقابت استعماری – نظریه بازی ها.
-
مراجع :
[1] J. Periaux et al, “Multi-Objective EAs and Game Theory”, Evolutionary Optimization and Game Strategies for Advanced Multi-Disciplinary Design, Intelligent Systems, Control and Automation: Science and Engineering,2015.
[2] Ramin Rajabioun, Esmaeil Atashpaz-Gargari, and Caro Lucas,” Colonial Competitive Algorithm as a Tool for Nash Equilibrium Point Achievement”, pringer-Verlag Berlin Heidelberg, O. Gervasi et al. (Eds.): ICCSA 2008, Part II, LNCS 5073, pp. 680–695, 2008.
[3] Atashpaz-Gargari, E., Lucas, C.: Imperialist Competitive Algorithm: An algorithm for optimization inspired by imperialistic competition. In: IEEE Congress on Evolutionary Computation, Singapore ,2007.
[4] Andres, G., Jose, H., Ernesto, R., & Alfredo, M. (2013). Indexing and retrieving in fin- gerprint databases under structural distortions. Expert Systems with Applications, 40 (8), 2858–2871.
[5] Laura, C., Jorge, H., & Viviana, E. (2006). Real time database systems. In Encyclopedia of database technologies and applications (pp. 524–530). Hershey, Pa.: Idea Group Referene
[6] Al-Sayid, N., & Aldlaeen, D. (2013). Database security threats: A survey study. In 2013 5th International conference on computer science and information technology (CSIT) (pp. 60–64).
[7] system. In Science and information conference (SAI) (pp. 556–563).
[8] Amirijoo, M., Hansson, J., & Son, S. (2006). Specification and management of QoS in real-time databases supporting imprecise computations. IEEE Transactions on Computers, 55 (3), 304–319;
[9] Kamra, A., & Bertino, E. (2009). Survey of machine learning methods for database security. In Machine learning in cyber trust (pp. 53–71). Springer
[10] Bertino, E., & Sandhu, R. (2005). Database security - concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2 (1), 2–19
[11] Jabbour, G., & Menasee, D. (2008). Policy-based enforcement of database security configuration through autonomic capabilities. In International conference on au- tonomic and autonomous systems (pp. 188–197)
[12] Darwish, S., Guirguis, S., & Ghozlan, M. (2013). Intrusion detection in role adminis- trated database: Transaction-based approach. In International conference on com- puter engineering and systems (ICCES) (pp. 73–79).
[13] Taneja, N., Raman, B., & Gupta, I. (2011). Chaos based partial encryption of spiht compressed images. International Journal of Wavelets Multiresolution and Infor- mation Processing, 9 (2), 317–331.
[14] Chen, J., Hu, C., Zeng, H., & Zhang, J. (2009). Impact of security on QoS in commu- nication network. In International conference on networks security, wireless com- munications and trusted computing: 2 (pp. 40–43)
[15] Alomari, F., & Menasce, D. (2012). An autonomic framework for integrating secu- rity and quality of service support in databases. In 2012 IEEE sixth international conference on software security and reliability (SERE) (pp. 51–60)
[16] Bayon, L., Grau, J., Ruiz, M., & Suarez, P. (2012). The exact solution of the environ- mental/economic dispatch problem. IEEE Transactions on Power Systems, 27 (2), 723–
[17] Menasce, D., & Kephart, J. (2007). Guest editors’ introduction: Autonomic comput- ing. IEEE Internet Computing, 18–21.
[18] Bennani, M., & Menasce, D. (2005). Resource allocation for autonomic data centers using analytic performance models. In Second international conference on auto- nomic computing (pp. 229–240).
[19] Kleinrock, L. (1975). Queueing systems. New York, USA: Wiley; Menasce, D. (2004). Performance by design computer capacity planning by example. Upper Saddle River, NJ, USA: Prentice Hall PTR.
[20] Menasce, D. (2004). Performance by design computer capacity planning by example. Upper Saddle River, NJ, USA: Prentice Hall PTR.
- صفحات : 16-32
-
دانلود فایل
( 1.10 MB )