Protection against many cyber security threats can be implemented by existing software on the system, with no need for security software. Some operating systems or program parameters can increase the security level and close any vulnerabilities if they are set properly. This project shows a way to prevent potential attacks with relatively low cost, but this method needs immediate attention. Reconfiguring a machine regularly is a moving target defense which is done by modifying the configuration regularly in the hopes of spoiling an attacker's reconnaissance efforts, the configurations are changed until they reach the fittest solution, so if the configurations are modified after a potential attacker's reconnaissance, then the gathered inform...
AbstractSecurity is the prominent concern for the network and maintaining security is highly recomme...
Abstract—With the increase in network based attacks in general, and the world-wide access to compute...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
Because malicious intrusions into critical information infrastructures are essential to the success ...
Intruders mercilessly attack commercial, academic, defence; healthy centers distributed (networked) ...
Security is the conspicuous worry for the network and it is energetically prescribed to keep up with...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Improve software security evaluation by combining fuzzing and genetic algorithms.Software Technology...
Security countermeasures help ensure information security: confidentiality, integrity and availabil...
This paper describes two algorithms for optimizing the design of distributed perimeter security syst...
Abstract – By making use of Genetic Algorithm, Optimization problems can be solved and the best fit ...
This research is focused on using a highly detailed simulation model to create a physical security s...
Today, there are several available technologies designed to build vehicular road travel easier, secu...
AbstractSecurity is the prominent concern for the network and maintaining security is highly recomme...
Abstract—With the increase in network based attacks in general, and the world-wide access to compute...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the “...
This paper presents an optimization framework, based on Genetic Algorithms, for the control of the '...
Because malicious intrusions into critical information infrastructures are essential to the success ...
Intruders mercilessly attack commercial, academic, defence; healthy centers distributed (networked) ...
Security is the conspicuous worry for the network and it is energetically prescribed to keep up with...
Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Common...
Improve software security evaluation by combining fuzzing and genetic algorithms.Software Technology...
Security countermeasures help ensure information security: confidentiality, integrity and availabil...
This paper describes two algorithms for optimizing the design of distributed perimeter security syst...
Abstract – By making use of Genetic Algorithm, Optimization problems can be solved and the best fit ...
This research is focused on using a highly detailed simulation model to create a physical security s...
Today, there are several available technologies designed to build vehicular road travel easier, secu...
AbstractSecurity is the prominent concern for the network and maintaining security is highly recomme...
Abstract—With the increase in network based attacks in general, and the world-wide access to compute...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...