I need three changes in my research paper. I mention them below
1. In page 6, 3.4 Introduction 5th line I need to write about
explain what authors meant by â€œtopology of an operating environmentâ€?
2. In page 9, 3.9 state space reduction heuristics 5th line I need to write about Explain how the analysis is reactive and not proactive?
3. In page 20, 7.0 Discussion after the table I need to write about
Talk about what prevention techniques (paper 3), and early detection techniques (paper 1 and 2 and main); discuss detection techniques have 3 similar models
Hereâ€™s an outline for the Discussion section:
-Use requirements patterns and a feature diagram to show relationships between patterns and their tradeoffs
-Model what is being protected â€“ asset model (UML), topology model (ambient calculus)
-Model the system behavior â€“ fuzzy causal network, labeled transition system
-Model the security objectives â€“ goal model, computational tree logic
-If the set of assets/things being protected changes, the system behavior is affected and the security objectives are re-checked to see if security will be violated
Main paper summary: Define topology, why reactive and not proactive?
I attach my research paper and the 4 papers related to the research below.