Results 1 to 10 of about 1,328,510 (186)

A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software

open access: yesIEEE Access, 2020
The main idea for practicing research towards security is to maintain usability of the software as well. This can be achieved by making less complex and high secure software.
Rajeev Kumar   +6 more
doaj   +3 more sources

Security Responses in Software Development [PDF]

open access: yesACM Transactions on Software Engineering and Methodology, 2023
The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development.
Tamara Lopez   +5 more
openaire   +2 more sources

Interpretable Single-dimension Outlier Detection (ISOD): An Unsupervised Outlier Detection Method Based on Quantiles and Skewness Coefficients

open access: yesApplied Sciences, 2023
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang   +4 more
doaj   +1 more source

Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML

open access: yesFrontiers in Computer Science, 2021
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert   +2 more
doaj   +1 more source

Analysis of identifiers in IoT platforms

open access: yesDigital Communications and Networks, 2020
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab   +5 more
doaj   +1 more source

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

open access: yesJournal of Cybersecurity and Privacy, 2022
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus   +8 more
doaj   +1 more source

An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning

open access: yesEntropy, 2022
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen   +7 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2002
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Bailey, Chris   +3 more
core   +3 more sources

A UML-based static verification framework for security [PDF]

open access: yes, 2010
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates that security characteristics should be considered from the early stages ...
Siveroni, I.   +2 more
core   +1 more source

A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink

open access: yesIEEE Access, 2019
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy