Results 1 to 10 of about 1,328,510 (186)
A Hybrid Model of Hesitant Fuzzy Decision-Making Analysis for Estimating Usable-Security of Software
The main idea for practicing research towards security is to maintain usability of the software as well. This can be achieved by making less complex and high secure software.
Rajeev Kumar +6 more
doaj +3 more sources
Security Responses in Software Development [PDF]
The pressure on software developers to produce secure software has never been greater. But what does security look like in environments that do not produce security-critical software? In answer to this question, this multi-sited ethnographic study characterizes security episodes and identifies five typical behaviors in software development.
Tamara Lopez +5 more
openaire +2 more sources
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang +4 more
doaj +1 more source
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert +2 more
doaj +1 more source
Analysis of identifiers in IoT platforms
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab +5 more
doaj +1 more source
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus +8 more
doaj +1 more source
An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning
Much research on adversarial attacks has proved that deep neural networks have certain security vulnerabilities. Among potential attacks, black-box adversarial attacks are considered the most realistic based on the the natural hidden nature of deep ...
Zhiyu Chen +7 more
doaj +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Bailey, Chris +3 more
core +3 more sources
A UML-based static verification framework for security [PDF]
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates that security characteristics should be considered from the early stages ...
Siveroni, I. +2 more
core +1 more source
A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink
In order to improve the sensing efficiency of the sensor network, a type of energy-balanced tree-based data collection strategy with mobile Sink (ETDC) is proposed.
Chao Sha +4 more
doaj +1 more source

