- [Bulut 1973] Bulut, Necdet. Invariant properties of algorithms. PhD Thesis, Purdue University (August 1973) 118-119. Google ScholarDigital Library
- [Bulut 1974] Bulut, Necdet and Halstead, Maurice H. Inpurities found in algorithm implemnetations. CSD-TR 111, Purdue University (1974).Google Scholar
- [Halstead 1972] Halstead, M. H. Natural laws controlling algorithm structure? ACM SIGPLAN Notices 7, 2 (February 1972) 19-26. Google ScholarDigital Library
- [Halstead 1977] Halstead, Maurice H. Elements of Software Science. Elsevier North Holland, New York. (1977) (in press). Google ScholarDigital Library
- [Kulm 1975] Kulm, Gerald. Language level applied to the information content of technical prose. In Collective phenonoma and the applications of physics to other fields of science (Prepared for delivery at a seminar Moscow, USSR, 1-5 July 1974) Norman A. Chigier and Edward A. Stern, eds., Fayetteville, N. Y. Brain Research Publications (1975) 401-408.Google Scholar
- [Ottenstein 1976] Ottenstein, Karl J. A Program to count operators and operands for ANSI-FORTRAN modules. CSD-TR 196, Purdue University (June 1976).Google Scholar
Index Terms
- An algorithmic approach to the detection and prevention of plagiarism
Recommendations
Predictive machine learning-based integrated approach for DDoS detection and prevention
AbstractDistributed Denial of Service attack has been a huge threat to the Internet and may carry extreme losses to systems, companies, and national security. The invader can disseminate Distributed denial of service (DDoS) attacks easily, and it ends up ...
A two-level hybrid approach for intrusion detection
To exploit the strengths of misuse detection and anomaly detection, an intensive focus on intrusion detection combines the two. From a novel perspective, in this paper, we proposed a hybrid approach toward achieving a high detection rate with a low ...
Web-based monitoring approach for network-based intrusion detection and prevention
There were many reports about incidents of network attacks and security treats. Damages caused by network attacks and malwares can be extremely expensive or unaffordable. In this paper, we present a web-based management system for network-based ...
Comments