Results 21 to 30 of about 38,778 (116)
Vulnerability Management for an Enterprise Resource Planning System
Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure.
Garg, Deepak, Goel, Shivani, Kiran, Ravi
core +1 more source
Mitigating smart card fault injection with link-time code rewriting: a feasibility study [PDF]
We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting. We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the ...
B. Sutter De +6 more
core +2 more sources
In recent days, a wide range of Internet of Things (IOT) related applications are employed for automated services. Various issues such as security, reliability and fault tolerance has restricted the use of IoT services in real time environments.
Mahaboob Basha Shaik +1 more
doaj +1 more source
Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis [PDF]
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to ...
Johnson, Christopher W. +2 more
core
Proposing a secure component-based-application logic and system’s integration testing approach [PDF]
Software engineering moved from traditional methods of software enterprise applications to com-ponent based development for distributed system’s applications. This new era has grown up forlast few years, with component-based methods, for design and rapid
Nabi, Faisal +2 more
core +2 more sources
Automatic Software Repair: a Bibliography [PDF]
This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs.
Monperrus, Martin
core +5 more sources
Online machine learning for proactive threat intelligence and timely DDoS attack prediction
Distributed Denial of Service (DDoS) attacks are rapidly escalating in scale and sophistication, posing critical threats to modern cloud infrastructures.
Rrezearta Thaqi +3 more
doaj +1 more source
Opportunities for aircraft controls research [PDF]
Several problems which drive aircraft control technology are discussed. Highly unstable vehicles, flutter speed boundary expansion, and low level automated flight that follows terrain are ...
Cunningham, T. B.
core +1 more source
Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L. +2 more
core
Quadruplex digital flight control system assessment [PDF]
Described are the development and validation of a double fail-operational digital flight control system architecture for critical pitch axis functions. Architectural tradeoffs are assessed, system simulator modifications are described, and demonstration ...
Downing, L. E. +2 more
core +1 more source

