Software Specifications and Design computer science assignment help

Swamped with your writing assignments? We'll take the academic weight off your shoulders. We complete all our papers from scratch. You can get a plagiarism report upon request just to confirm.

Order a Similar Paper Order a Different Paper

I need three changes in my research paper. I mention them below

1. In page 6,  3.4 Introduction 5th line I need to write about 

explain what authors meant by “topology of an operating environment”?

2. In page 9,  3.9 state space reduction heuristics 5th line I need to write about                                                                Explain how the analysis is reactive and not proactive?

3. In page 20, 7.0 Discussion after the table I need to write about 

Talk about what prevention techniques (paper 3), and early detection techniques (paper 1 and 2 and main); discuss detection techniques have 3 similar models 

Here’s an outline for the Discussion section:


-Use requirements patterns and a feature diagram to show relationships between patterns and their tradeoffs

Early detection

-Model what is being protected – asset model (UML), topology model (ambient calculus)

-Model the system behavior – fuzzy causal network, labeled transition system

-Model the security objectives – goal model, computational tree logic

-If the set of assets/things being protected changes, the system behavior is affected and the security objectives are re-checked to see if security will be violated

Main paper summary: Define topology, why reactive and not proactive?

I attach my research paper and the  4 papers related to the research below.

We offer CUSTOM-WRITTEN, CONFIDENTIAL, ORIGINAL, and PRIVATE writing services. Kindly click on the ORDER NOW button to receive an A++ paper from our masters- and PhD writers.

Get a 10% discount on your order using the following coupon code SAVE10

Order a Similar Paper Order a Different Paper