December 2015
·
159 Reads
·
1 Citation
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
December 2015
·
159 Reads
·
1 Citation
October 2015
·
808 Reads
·
5 Citations
October 2015
·
2,120 Reads
·
16 Citations
October 2015
·
63 Reads
·
1 Citation
... Vulnerability management is a multi-phase process, as shown in Figure 3. The overall aim of the process is to identify, measure, and classify vulnerabilities in systems, applications, and networks based on the risk they represent [51]. Vulnerability assessment is an integral part of the vulnerability management program. ...
October 2015
... Additionally, surveys that do take note of swarm intelligence-based software reliability prediction has only covered the popular swarm intelligence algorithms. Altaf et al. performed an analysis into the field of parameter estimation in software reliability and identified 12 different studies within the domain ranging from the 2004 to 2011 (Altaf et al., 2015). Their work covered a wide range of stochastic techniques including Two Parameter Distribution and swarm intelligence algorithms of Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO) and Cuckoo Search (CuS). ...
October 2015