Algorithmic Analysis of the System Based on the Functioning Table and Information Security

被引:8
作者
Kabulov, Anvar [1 ]
Yarashov, Inomjon [1 ]
Otakhonov, Alisher [2 ]
机构
[1] Natl Univ Uzbekistan, Fac Appl Math & Intelligent Technol, Tashkent, Uzbekistan
[2] Fergana State Univ, Fac Math & Informat, Fergana, Uzbekistan
来源
2022 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS) | 2022年
关键词
algorithmic analysis; functioning table; information security; ecological monitoring; algorithmic formalization;
D O I
10.1109/IEMTRONICS55184.2022.9795746
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Systems are ideally and rapidly evolving with the development of the Internet and modern web technologies. Example, Ecological monitoring information system has become very important in determining its superiority as a system, so it should be tested. This article describes how to benchmark a system by creating a state change graph to simulate different intuitions on the part of each subsystem, and then comparing the graph to Petri net modeling based on Functioning table (PNMFT). Test cases can be prepared based on the accessibility of trees based on comparable PNMFTs. The existing fact-testing strategy for comprehensive testing of the system will be further generalized to improve the consistent quality of the remaining tests. After that, talk about algorithmic analysis of the system is an important for information security issue. The initial stage of ongoing research to improve the reliability of algorithmic analysis of algorithmic formalization of web systems is described. It may also be advisable to include a set of dynamic coverage criteria for web systems defined for the statistical testing approach used through algorithmic analysis to improve testing quality and algorithmic formalization of the web system through algorithmic analysis.
引用
收藏
页码:241 / 245
页数:5
相关论文
共 43 条
[1]  
Aceto G., 2018, J NETW COMPUT APPL, V57
[2]  
[Anonymous], 2018, DDOS EVALUATION DATA
[3]   ALGORITHMIC STABILITY FOR ADAPTIVE DATA ANALYSIS [J].
Bassily, Raef ;
Nissim, Kobbi ;
Smith, Adam ;
Steinke, Thomas ;
Stemmer, Uri ;
Ullman, Jonathan .
SIAM JOURNAL ON COMPUTING, 2021, 50 (03)
[4]  
Bindra N, 2020, ROM J INF SCI TECH, V23, P250
[5]   DDoSNet: A Deep-Learning Model for Detecting Network Attacks [J].
Elsayed, Mahmoud Said ;
Nhien-An Le-Khac ;
Dev, Soumyabrata ;
Jurcut, Anca Delia .
2020 21ST IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (IEEE WOWMOM 2020), 2020, :391-396
[6]  
Fugkeaw S., 2022, Social Netw. Comput. Sci., V3, P1
[7]   Rational Use of Cognitive Resources: Levels of Analysis Between the Computational and the Algorithmic [J].
Griffiths, Thomas L. ;
Lieder, Falk ;
Goodman, Noah D. .
TOPICS IN COGNITIVE SCIENCE, 2015, 7 (02) :217-229
[8]   Algorithmic analysis of nonlinear hybrid systems [J].
Henzinger, TA ;
Ho, PH ;
Wong-Toi, H .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1998, 43 (04) :540-554
[9]  
Juraev G., 2021, 2021 INT C INFORM SC, P16
[10]  
Kabulov A., SMART TRANSPORT C 20, P1