Results 21 to 30 of about 38,778 (116)

Vulnerability Management for an Enterprise Resource Planning System

open access: yes, 2012
Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure.
Garg, Deepak, Goel, Shivani, Kiran, Ravi
core   +1 more source

Mitigating smart card fault injection with link-time code rewriting: a feasibility study [PDF]

open access: yes, 2013
We present a feasibility study to protect smart card software against fault-injection attacks by means of binary code rewriting. We implemented a range of protection techniques in a link-time rewriter and evaluate and discuss the obtained coverage, the ...
B. Sutter De   +6 more
core   +2 more sources

Secret Elliptic Curve-Based Bidirectional Gated Unit Assisted Residual Network for Enabling Secure IoT Data Transmission and Classification Using Blockchain

open access: yesIEEE Access
In recent days, a wide range of Internet of Things (IOT) related applications are employed for automated services. Various issues such as security, reliability and fault tolerance has restricted the use of IoT services in real time environments.
Mahaboob Basha Shaik   +1 more
doaj   +1 more source

Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis [PDF]

open access: yes, 2012
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to ...
Johnson, Christopher W.   +2 more
core  

Proposing a secure component-based-application logic and system’s integration testing approach [PDF]

open access: yes, 2019
Software engineering moved from traditional methods of software enterprise applications to com-ponent based development for distributed system’s applications. This new era has grown up forlast few years, with component-based methods, for design and rapid
Nabi, Faisal   +2 more
core   +2 more sources

Automatic Software Repair: a Bibliography [PDF]

open access: yes, 2016
This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs.
Monperrus, Martin
core   +5 more sources

Online machine learning for proactive threat intelligence and timely DDoS attack prediction

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Distributed Denial of Service (DDoS) attacks are rapidly escalating in scale and sophistication, posing critical threats to modern cloud infrastructures.
Rrezearta Thaqi   +3 more
doaj   +1 more source

Opportunities for aircraft controls research [PDF]

open access: yes, 1984
Several problems which drive aircraft control technology are discussed. Highly unstable vehicles, flutter speed boundary expansion, and low level automated flight that follows terrain are ...
Cunningham, T. B.
core   +1 more source

Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]

open access: yes, 2013
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L.   +2 more
core  

Quadruplex digital flight control system assessment [PDF]

open access: yes
Described are the development and validation of a double fail-operational digital flight control system architecture for critical pitch axis functions. Architectural tradeoffs are assessed, system simulator modifications are described, and demonstration ...
Downing, L. E.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy