Results 11 to 20 of about 5,764,266 (332)
Unhelpful Assumptions in Software Security Research
In the study of software security many factors must be considered. Once venturing beyond the simplest of laboratory experiments, the researcher is obliged to contend with exponentially complex conditions.
Ita Ryan, U. Roedig, Klaas-Jan Stol
semanticscholar +1 more source
Measuring security requirements for software security [PDF]
For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature.
Shareeful Islam, Paolo Falcarin
openaire +1 more source
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang +4 more
doaj +1 more source
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert +2 more
doaj +1 more source
Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis
Cyber attacks targeting software applications have a tremendous impact on our daily life. For example, attackers have utilized vulnerabilities of web applications to steal and gain unauthorized use of sensitive data stored in these systems.
Wentao Wang +3 more
semanticscholar +1 more source
Analysis of identifiers in IoT platforms
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab +5 more
doaj +1 more source
Security and Independence of Process Safety and Control Systems in the Petroleum Industry
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus +8 more
doaj +1 more source
Analyzing the Data of Software Security Life-Span: Quantum Computing Era
Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of ...
Hashem Alyami +7 more
semanticscholar +1 more source
The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ...
Hashem Alyami +7 more
semanticscholar +1 more source
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +3 more sources

