Buscar
Mostrando ítems 1-10 de 10
Prevention and fighting against web attacks through anomaly detection technology. A systematic review
(Sustainability (Switzerland), 2020-06-01)
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ...
Study of local convergence and dynamics of a king-like two-step method with applications
(Mathematics, 2020-07-01)
In this paper, we present the local results of the convergence of the two-step King-like method to approximate the solution of nonlinear equations. In this study, we only apply conditions to the first derivative, because ...
Weaker conditions for inexact mutitpoint Newton-like methods
(Journal of Mathematical Chemistry, 2020-01)
In this paper we study the problem of analyzing the convergence both local and semilocal of inexact Newton-like methods for approximating the solution of an equation in which there exists nondifferentiability. We will ...
Extending the Applicability of Stirling's Method
(Mathematics, 2020-01)
Stirling's method is considered as an alternative to Newton's method when the latter fails to converge to a solution of a nonlinear equation. Both methods converge quadratically under similar convergence criteria and require ...
A new technique for studying the convergence of Newton’s solver with real life applications
(Journal of Mathematical Chemistry, 2020-04)
The convergence domain for both the local and semilocal case of Newton’s method for Banach space valued operators is small in general. There is a plethora of articles that have extended the convergence criterion due to ...
Convergence and Dynamics of a Higher-Order Method
(Symmetry, 2020-03)
Solving problems in various disciplines such as biology, chemistry, economics, medicine, physics, and engineering, to mention a few, reduces to solving an equation. Its solution is one of the greatest challenges. It involves ...
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
(CMC-Computers Materials & Continua, 2020)
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ...
Systematic Approach to Malware Analysis (SAMA)
(Applied Sciences, 2020-02)
Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find ...
A New Mail System for Secure Data Transmission in Cyber Physical Systems
(International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2020-12)
This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ...
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
(Applied Sciences-Basel, 2020-12)
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...