scholarly journals Development of a fuzzy GERT-model for investigating common software vulnerabilities

2021 ◽  
Vol 6 (2 (114)) ◽  
pp. 6-18
Author(s):  
Serhii Semenov ◽  
Liqiang Zhang ◽  
Weiling Cao ◽  
Serhii Bulba ◽  
Vira Babenko ◽  
...  

This paper has determined the relevance of the issue related to improving the accuracy of the results of mathematical modeling of the software security testing process. The fuzzy GERT-modeling methods have been analyzed. The necessity and possibility of improving the accuracy of the results of mathematical formalization of the process of studying software vulnerabilities under the conditions of fuzziness of input and intermediate data have been determined. To this end, based on the mathematical apparatus of fuzzy network modeling, a fuzzy GERT model has been built for investigating software vulnerabilities. A distinctive feature of this model is to take into consideration the probabilistic characteristics of transitions from state to state along with time characteristics. As part of the simulation, the following stages of the study were performed. To schematically describe the procedures for studying software vulnerabilities, a structural model of this process has been constructed. A "reference GERT model" has been developed for investigating software vulnerabilities. The process was described in the form of a standard GERT network. The algorithm of equivalent transformations of the GERT network has been improved, which differs from known ones by considering the capabilities of the extended range of typical structures of parallel branches between neighboring nodes. Analytical expressions are presented to calculate the average time spent in the branches and the probability of successful completion of studies in each node. The calculation of these probabilistic-temporal characteristics has been carried out in accordance with data on the simplified equivalent fuzzy GERT network for the process of investigating software vulnerabilities. Comparative studies were conducted to confirm the accuracy and reliability of the results obtained. The results of the experiment showed that in comparison with the reference model, the fuzziness of the input characteristic of the time of conducting studies of software vulnerabilities was reduced, which made it possible to improve the accuracy of the simulation results.

Author(s):  
Muhammad Sulleman Memon ◽  
Mairaj Nabi Bhatti ◽  
Manzoor Ahmed Hashmani ◽  
Muhammad Shafique Malik ◽  
Naveed Murad Dahri

With the growth of software vulnerabilities, the demand for security integration is increasingly necessary to more effectively achieve the goal of secure software development globally. Different practices are used to keep the software intact. These practices should also be examined to obtain better results depending on the level of security. The security of a software program device is a characteristic that permeates the whole system. To resolve safety issues in a software program security solutions have to be implemented continually throughout each web page. The motive of this study is to offer a complete analysis of safety, wherein protection testing strategies and equipment can be categorized into: technical evaluation strategies and non-technical assessment strategies. This study presents high-level ideas in an easy form that would help professionals and researchers solve software security testing problems around the world. One way to achieve these goals is to separate security issues from other enforcement issues so that they can be resolved independently and applied globally.


2018 ◽  
Vol 7 (3.7) ◽  
pp. 156
Author(s):  
Erry Yulian Triblas Adesta ◽  
Herry Agung Prabowo

Only a few companies in Indonesia have implemented Total Productive Maintenance (TPM) and Lean Manufacturing (LM) properly. They also implemented LM separately with TPM. To look beyond their implementation, a research through survey method will be conducted to identify the status of TPM and LM practices. The data recorded through the survey will be calculated and analysed using Structural Equation Modelling (SEM) with Smart-PLS as a programming tool. The expected results were to provide updated barriers and enablers factors in implementing TPM and LM, to produced reliable CFA (measurement) models for TPM, LM and MP and proposing reference model (structural model) of the relationship between TPM, LM, and MP for manufacturing industries in Indonesia.  


2021 ◽  
Vol 13 (14) ◽  
pp. 7858
Author(s):  
Mariia Ruda ◽  
Oleksandr Moroz ◽  
Olha Kuz ◽  
Taras Boyko

The article deals with the issue of developing a cyber-physical system of a psychological profile of a specialist in professions of the ‘man-nature’ type in the formation of specialists for sustainable development. The proposed cyber-physical system of psychophysiological support of professional self-realization in professions of the ‘man-nature’ type is presented in the form of a hierarchical structure, the upper level of which reflects the vision of the customer (client) and contains the necessary properties and their significance coefficients, and the lower level is a set of characteristics that affect the corresponding properties as well as the corresponding weight values. The cyber-physical system makes it possible to clearly represent the psychophysiological profile of a specialist when working on building a standard of a specialist using the method of expert assessments. This system also allows you to easily automate the process of creating a reference model of a specialist for professions of the ‘man-nature’ type and will provide estimates of the significance of each of the obtained characteristics. The novelty of the cyber-physical system lies in the integration of points of view on the professional self-realization of a specialist on the part of the customer and on the part of psychologists. The significance of the upper-level elements comes from experts (customers) for each profile, while the weights of the relationship between characteristics and a certain quality are constant regardless of the specialty and can be obtained from expert psychologists in advance. Based on the analysis of a formalized description of available psychodiagnostic techniques, a generalized model of psychodiagnostic techniques and a structural model of a set of psychodiagnostic techniques have been developed. This approach differs from the known ones in a formalized representation, as well as taking into account the vector of resources necessary for the implementation of the technique. The proposed approach made it possible for the first time to formulate the problem of choosing a set of psychodiagnostic techniques as an optimization problem. The developed complex of algorithms, containing all the characteristics of cybernetic systems, is controllable and consists of a set of subsystems that act as mechanisms for the restoration and implementation of self-preserving reactions. That is, this complex of algorithms is effective, which is characterized by a certain set of parameters. Hence, the key role of the system of transmission and processing of information in training specialists for sustainable development becomes clear, and the importance of intellectualization of management processes is explained.


Author(s):  
С.Ю. Давыдов ◽  
А.В. Зубов

Abstract Exact analytical expressions for the local densities of states and the occupation numbers of atoms at the zigzag edge of a graphene nanoribbon are derived in the context of a simple structural model. As an example of application of the results, the problem of a Koster–Slater defect is considered.


Author(s):  
С.Ю. Давыдов

AbstractA simple structural model is proposed for the zigzag interface formed by contacting two-dimensional graphene-like compounds AB and CD (both free and formed on a metal). For the graphene–hexagonal boron nitride system, analytical expressions for the electron spectrum, density of states, and atom occupation numbers at the interface are obtained. The results of calculating the densities of states and occupation numbers within two alternative approximations are in good agreement.


2022 ◽  
pp. 1245-1271
Author(s):  
Muhammad Sulleman Memon ◽  
Mairaj Nabi Bhatti ◽  
Manzoor Ahmed Hashmani ◽  
Muhammad Shafique Malik ◽  
Naveed Murad Dahri

With the growth of software vulnerabilities, the demand for security integration is increasingly necessary to more effectively achieve the goal of secure software development globally. Different practices are used to keep the software intact. These practices should also be examined to obtain better results depending on the level of security. The security of a software program device is a characteristic that permeates the whole system. To resolve safety issues in a software program security solutions have to be implemented continually throughout each web page. The motive of this study is to offer a complete analysis of safety, wherein protection testing strategies and equipment can be categorized into: technical evaluation strategies and non-technical assessment strategies. This study presents high-level ideas in an easy form that would help professionals and researchers solve software security testing problems around the world. One way to achieve these goals is to separate security issues from other enforcement issues so that they can be resolved independently and applied globally.


2021 ◽  
Vol 3 (2 (111)) ◽  
pp. 24-34
Author(s):  
Serhii Semenov ◽  
Zhang Liqiang ◽  
Cao Weiling ◽  
Viacheslav Davydov

This paper reports an analysis of the software (SW) safety testing techniques, as well as the models and methods for identifying vulnerabilities. An issue has been revealed related to the reasoned selection of modeling approaches at different stages of the software safety testing process and the identification of its vulnerabilities, which reduces the accuracy of the modeling results obtained. Two steps in the process of identifying software vulnerabilities have been identified. A mathematical model has been built for the process of preparing security testing, which differs from the known ones by a theoretically sound choice of the moment-generating functions when describing transitions from state to state. In addition, the mathematical model takes into consideration the capabilities and risks of the source code verification phase for cryptographic and other ways to protect data. These features generally improve the accuracy of modeling results and reduce input uncertainty in the second phase of software safety testing. An advanced security compliance algorithm has been developed, with a distinctive feature of the selection of laws and distribution parameters that describe individual state-to-state transitions for individual branches of Graphical Evaluation and Review Technique networks (GERT-networks). A GERT-network has been developed to prepare for security testing. A GERT-network for the process of checking the source code for cryptographic and other data protection methods has been developed. A graphic-analytical GERT model for the first phase of software safety testing has been developed. The expressions reported in this paper could be used to devise preliminary recommendations and possible ways to improve the effectiveness of software safety testing algorithms


Author(s):  
С.Ю. Давыдов

AbstractFor a brick-wall-like lattice topologically equivalent to the graphene lattice, a simple structural model of a zigzag edge decorated with particles is constructed. Analytical expressions for the energy band spectrum, densities of states, and occupation numbers of the graphene–particles system are derived for a system in the free state and for a system formed on a metal substrate.


Author(s):  
Linda C. Sawyer

Recent liquid crystalline polymer (LCP) research has sought to define structure-property relationships of these complex new materials. The two major types of LCPs, thermotropic and lyotropic LCPs, both exhibit effects of process history on the microstructure frozen into the solid state. The high mechanical anisotropy of the molecules favors formation of complex structures. Microscopy has been used to develop an understanding of these microstructures and to describe them in a fundamental structural model. Preparation methods used include microtomy, etching, fracture and sonication for study by optical and electron microscopy techniques, which have been described for polymers. The model accounts for the macrostructures and microstructures observed in highly oriented fibers and films.Rod-like liquid crystalline polymers produce oriented materials because they have extended chain structures in the solid state. These polymers have found application as high modulus fibers and films with unique properties due to the formation of ordered solutions (lyotropic) or melts (thermotropic) which transform easily into highly oriented, extended chain structures in the solid state.


Sign in / Sign up

Export Citation Format

Share Document