Now showing items 1-7 of 7
Multi-tenant architectures in the cloud: a systematic mapping study
(IEEE, 345 E 47Th St, New York, Ny 10017 USA, 2017)
Unlike traditional web applications, cloud-based applications can provide services for large number of tenants using the same hardware and software by implementing multi-tenant architectures. 407 papers have been examined ...
A Systematic Mapping Study on Software Architecture Recovery
In this study, we investigated the approaches used in software architecture recovery papers, identify the current status of paper distributions in terms of year, publication channel, electronic databases, and journals. ...
Intrusion Detection Systems with GPU-Accelerated Deep Neural Networks and Effect of the Depth
With the extended use of the Internet, which connects millions of computers across the world, there is a growing number and types of intrusions which complicate ensuring the security of information and computers. Although ...
Neural network based intrusion detection systems with different training functions
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2018)
In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements ...
Genetic algorithm for intrusion detection systemGenetik Algoritma ile Saldırı Tespit Sistemi
(IEEE, 345 E 47th St, New York, Ny 10017 USA, 2016)
Intrusion detection systems are systems that prevent or slow the serving of different types of server data traffic caused by intensive use of networks that spread by internet. Particularly in recent years, because of ...