Search results for "Executable"
showing 5 items of 35 documents
A Peer-to-Peer Market Algorithm for a Blockchain Platform
2020
In an era of technological revolution in which everything becomes smarter and connected, the blockchain can introduce a new model for energy transactions able to grant more simplicity, security and transparency for end-users. The blockchain technology is characterized by a distributed architecture without a trusted and centralized authority, and, therefore, it appears as the perfect solutions for managing exchanges between peers. In this paper, a market algorithm that can be easily transferred to a smart contract for maximizing the match between produced and consumed energy in a micro-grid is presented. The algorithm supports energy transactions between peers (both producers and consumers) …
Cyber Security Strategy Implementation Architecture in a Value System
2018
In this chapter, we introduce an approach toward enhancing the quality of strategy implementation. As a framework, we use cybersecurity strategy implementation planning and execution. Justification for this work is the observed need to be able to perform strategy readjustment processes quickly and in an agile way, when needed. This requires processes and practices that are simple enough and executable with small resources in a relatively short timeframe. The problem statement can be formulated as follows: “We need to determine an utterly simplified, noncomplicated model to help us to tackle the complex problem of implementing a cybersecurity strategy of adequate efficiency in a changing ope…
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Supporting Agile Development by Facilitating Natural User Interaction with Executable Formal Specifications
2011
Agile development benefits from fast feedback from various stakeholders. If implemented in a suitable way, formal methods can enhance the agile development process. With an executable formal specification, it is possible to analyse and simulate the behaviour of the target system before it is being built. However, for the users' and developers' natural participation in the development process, it is necessary to use a real end-user interface and bind it to the execution environment being used in the simulations and animations. This requires, though, that the execution model used to simulate the specification is appropriately changed to facilitate the use of these user interfaces. The authors…
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware
2013
Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…