Results 1 to 10 of about 193,653 (266)

Measuring security requirements for software security [PDF]

open access: yes2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), 2011
For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature.
Shareeful Islam, Paolo Falcarin
openaire   +1 more source

Interpretable Single-dimension Outlier Detection (ISOD): An Unsupervised Outlier Detection Method Based on Quantiles and Skewness Coefficients

open access: yesApplied Sciences, 2023
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang   +4 more
doaj   +1 more source

Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML

open access: yesFrontiers in Computer Science, 2021
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert   +2 more
doaj   +1 more source

Analysis of identifiers in IoT platforms

open access: yesDigital Communications and Networks, 2020
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab   +5 more
doaj   +1 more source

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

open access: yesJournal of Cybersecurity and Privacy, 2022
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus   +8 more
doaj   +1 more source

An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning

open access: yesEntropy, 2022
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen   +7 more
doaj   +1 more source

A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink

open access: yesIEEE Access, 2019
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha   +4 more
doaj   +1 more source

A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN

open access: yesIEEE Access, 2019
Due to the complex and time-varying network environments, traditional methods are difficult to extract accurate features of intrusion behavior from the high-dimensional data samples and process the high-volume of these data efficiently.
Jin Yang   +4 more
doaj   +1 more source

Software Architecture of Code Analysis Frameworks Matters: The Frama-C Example [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2015
Implementing large software, as software analyzers which aim to be used in industrial settings, requires a well-engineered software architecture in order to ease its daily development and its maintenance process during its lifecycle.
Julien Signoles
doaj   +1 more source

A High-Efficiency Data Collection Method Based on Maximum Recharging Benefit in Sensor Networks

open access: yesSensors, 2018
To reduce time delays during data collection and prolong the network lifetime in Wireless Rechargeable Sensor Networks (WRSNs), a type of high-efficiency data collection method based on Maximum Recharging Benefit (DCMRB) is proposed in this paper ...
Chao Sha   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy