Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 10
Page No. 3482 - 3491

Applying a Mathematical Approach to Interpreting the Results of Testing Software and Hardware Data Security Tools During the Verification Process

Authors : Andrey M. Kanner and Tatiana M. Kanner

References

Adamcsek, E., 2008. The analytic hierarchy process and its generalizations. Master Thesis, Eotvos Lorand University, Budapest, Hungary.

Chernorutsky, I.G., 2001. Methods of Optimization and Decision Making. LAN Publishing, Saint Petersburg, Russia,.

Cogger, K.O. and P.L. Yu, 1985. Eigenweight vectors and least-distance approximation for revealed preference in pairwise weight ratios. J. Optim. Theor. Appl., 46: 483-491.
CrossRef  |  Direct Link  |  

Drobotun, E.B., 2009. [Criticality of errors in software and analysis of their consequences (in Russian)]. Fundam. Res., 1: 73-74.

Kanner, A.M. and L.M. Ukhlinov, 2012. [Access control in GNU/Linux (in Russian)]. Inf. Secur. Questions, 1: 35-38.

Kanner, A.M., 2014. [Linux: Process life cycle and access control (in Russian)]. Inf. Secur. Questions, 1: 37-40.

Kanner, A.M., 2016. Correctness of data security tools for protection against unauthorized access and their interaction in GNU/Linux. Global J. Pure Appl. Math., 12: 2479-2501.
Direct Link  |  

Kanner, T.M. and K.h.S. Sultanahmedov, 2014. [Features of verification of data security tools (In Russian)]. Inf. Secur. Questions, 4: 55-57.

Kanner, T.M., 2015. [Features of using virtualization for testing software and hardware data security tools (In Russian)]. Inf. Secur., 18: 416-419.

Kanner, T.M., 2016. Applicability of software testing methods to software and hardware data security tools. Global J. Pure Appl. Math., 12: 167-190.
Direct Link  |  

Kanner, T.M., 2017. [The effectiveness of using supporting tools for testing software and hardware DST (In Russian)]. Inf. Secur. Questions, 1: 9-13.

Kanner, T.M., 2018. [Adaptation of existing verification methods for software and hardware DST (In Russian)]. Inf. Secur. Questions, 1: 13-19.

Kim, I.Y. and O.L. De Weck, 2006. Adaptive weighted sum method for multiobjective optimization: A new method for Pareto front generation. Struct. Multidiscip. Optim., 31: 105-116.
CrossRef  |  Direct Link  |  

Kulyamin, V.V., 2008. Software Verification Methods. Institute for System Programming of the RAS, Moscow, Russia, (In Russian).

Lin, J., 1976. Multiple-objective problems: Pareto-optimal solutions by method of proper equality constraints. IEEE. Trans. Autom. Control, 21: 641-650.
CrossRef  |  Direct Link  |  

Saaty, T.L., 1977. A scaling method for priorities in hierarchical structures. J. Math. Psychol., 15: 234-281.
CrossRef  |  Direct Link  |  

Saaty, T.L., 1980. The Analytical Hierarchy Process. 2nd Edn., McGraw-Hill, New York, USA., ISBN:9780070543713, Pages: 287.

Takeda, E., K.O. Cogger and P.L. Yu, 1987. Estimating criterion weights using eigenvectors: A comparative study. Eur. J. Oper. Res., 29: 360-369.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved