Infrastructural Map for Information Security
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2
Abstract
The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for creating a blueprint of the organization to guide security planning in the network.
Authors and Affiliations
Sabah Al-Fedaghi , Hanaa Alnashwan
Mining Weighted Association Rule using FP – tree
The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same si...
Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers
The healthcare environment is still ‘information rich’ But ‘knowledge poor’. There is a wealth of data available within the health care systems. However, there is a lack of effective analysis tools to discover hidden rel...
General Framework for Cluster based Active Learning Algorithm
This paper revisits the problem of active learning and decision making when the cost of labeling incurs cost and unlabeled data is available in abundance. In many real world applications large amounts of data are availab...
A Mixed-Mode Signal Processing Architecture for Radix-2 DHT
This paper proposes a mixed-mode signal processing architecture for radix-2 DHT. In the known algorithms, the stage structures perform all the additions and multiplications. The proposed algorithm introduces multiplying...
Efficient Parallel Data Processing in the Cloud
Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamic...