YarMap

Displaying 1-6 of 6 results

  • White Papers // Jan 2013

    Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT

    An endless number of methods or ways exists to access illegally a web server or a website. The task of defending a system (e.g. network, server, website, etc.) is complex and challenging. SNORT is one of the popular open source tools that can be used to detect and possibly prevent...

    Provided By YarMap

  • White Papers // Jan 2013

    Call Graph Based Metrics To Evaluate Software Design Quality

    Software defects prediction was introduced to support development and maintenance activities such as improving the software quality through finding errors or patterns of errors early in the software development process. Software defects prediction is playing the role of maintenance facilitation in terms of effort, time and more importantly the cost...

    Provided By YarMap

  • White Papers // Nov 2012

    Block-Based Atomicity in Message-Passing Distributed Programs

    In this paper, the authors have studied the notion of atomicity in message-passing distributed programs. The difference between the notion of atomicity in shared memory programs and message passing programs has been discussed in detail. Due to the nature of communication in messagepassing programs, the atomicity requirement in shared memory...

    Provided By YarMap

  • White Papers // Oct 2012

    Bank Web Sites Phishing Detection and Notification System Based on Semantic Web Technologies

    In this paper, the authors propose a system for client-side defenses such as browser plug-ins and classification techniques that are adopted in such detection scenarios. The system inspects the HTML pages as an annotated document represented or embedded in XHTML format using RDF annotations. While the proposed solution has been...

    Provided By YarMap

  • White Papers // Oct 2012

    A Survey of Learning Based Techniques of Phishing Email Filtering

    Phishing email is one of the major issues of the web now-a-days ensuing in monetary losses for organizations and individual users. Varied approaches are developed to filter phishing emails. The current paper focuses on machine learning applications used to detect and predict phishing emails. Moreover, a comparative study and analysis...

    Provided By YarMap

  • White Papers // Apr 2011

    Proposed Framework for Security Risk Assessment

    Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems' threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a...

    Provided By YarMap

  • White Papers // Nov 2012

    Block-Based Atomicity in Message-Passing Distributed Programs

    In this paper, the authors have studied the notion of atomicity in message-passing distributed programs. The difference between the notion of atomicity in shared memory programs and message passing programs has been discussed in detail. Due to the nature of communication in messagepassing programs, the atomicity requirement in shared memory...

    Provided By YarMap

  • White Papers // Oct 2012

    Bank Web Sites Phishing Detection and Notification System Based on Semantic Web Technologies

    In this paper, the authors propose a system for client-side defenses such as browser plug-ins and classification techniques that are adopted in such detection scenarios. The system inspects the HTML pages as an annotated document represented or embedded in XHTML format using RDF annotations. While the proposed solution has been...

    Provided By YarMap

  • White Papers // Jan 2013

    Call Graph Based Metrics To Evaluate Software Design Quality

    Software defects prediction was introduced to support development and maintenance activities such as improving the software quality through finding errors or patterns of errors early in the software development process. Software defects prediction is playing the role of maintenance facilitation in terms of effort, time and more importantly the cost...

    Provided By YarMap

  • White Papers // Apr 2011

    Proposed Framework for Security Risk Assessment

    Security risk assessment framework provides comprehensive structure for security risk analysis that would help uncover systems' threats and vulnerabilities. While security risk assessment is an important step in the security risk management process, this paper will focus only on the security risk assessment framework. Viewing issues that exist in a...

    Provided By YarMap

  • White Papers // Jan 2013

    Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT

    An endless number of methods or ways exists to access illegally a web server or a website. The task of defending a system (e.g. network, server, website, etc.) is complex and challenging. SNORT is one of the popular open source tools that can be used to detect and possibly prevent...

    Provided By YarMap

  • White Papers // Oct 2012

    A Survey of Learning Based Techniques of Phishing Email Filtering

    Phishing email is one of the major issues of the web now-a-days ensuing in monetary losses for organizations and individual users. Varied approaches are developed to filter phishing emails. The current paper focuses on machine learning applications used to detect and predict phishing emails. Moreover, a comparative study and analysis...

    Provided By YarMap