Results 1 to 10 of about 193,653 (266)
Measuring security requirements for software security [PDF]
For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature.
Shareeful Islam, Paolo Falcarin
openaire +1 more source
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang +4 more
doaj +1 more source
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert +2 more
doaj +1 more source
Analysis of identifiers in IoT platforms
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab +5 more
doaj +1 more source
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus +8 more
doaj +1 more source
An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen +7 more
doaj +1 more source
A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha +4 more
doaj +1 more source
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently.
Jin Yang +4 more
doaj +1 more source
Software Architecture of Code Analysis Frameworks Matters: The Frama-C Example [PDF]
Implementing large software, as software analyzers which aim to be used in industrial settings, requires a well-engineered software architecture in order to ease its daily development and its maintenance process during its lifecycle.
Julien Signoles
doaj +1 more source
A High-Efficiency Data Collection Method Based on Maximum Recharging Benefit in Sensor Networks
To reduce time delays during data collection and prolong the network lifetime in Wireless Rechargeable Sensor Networks (WRSNs), a type of high-efficiency data collection method based on Maximum Recharging Benefit (DCMRB) is proposed in this paper ...
Chao Sha +3 more
doaj +1 more source

