Results 11 to 20 of about 5,764,266 (332)

Unhelpful Assumptions in Software Security Research

open access: yesConference on Computer and Communications Security, 2023
In the study of software security many factors must be considered. Once venturing beyond the simplest of laboratory experiments, the researcher is obliged to contend with exponentially complex conditions.
Ita Ryan, U. Roedig, Klaas-Jan Stol
semanticscholar   +1 more source

Measuring security requirements for software security [PDF]

open access: yes2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), 2011
For the last decade's software security has gained attention by industries, experts and all other communities. Secure software is about mitigating risks from assets to achieve business goals. Security is highly depending on the context where software is deployed. But measuring software security even within a specific context is still not mature.
Shareeful Islam, Paolo Falcarin
openaire   +1 more source

Interpretable Single-dimension Outlier Detection (ISOD): An Unsupervised Outlier Detection Method Based on Quantiles and Skewness Coefficients

open access: yesApplied Sciences, 2023
A crucial area of study in data mining is outlier detection, particularly in the areas of network security, credit card fraud detection, industrial flaw detection, etc.
Yuehua Huang   +4 more
doaj   +1 more source

Application-Aware Intrusion Detection: A Systematic Literature Review, Implications for Automotive Systems, and Applicability of AutoML

open access: yesFrontiers in Computer Science, 2021
Modern and flexible application-level software platforms increase the attack surface of connected vehicles and thereby require automotive engineers to adopt additional security control techniques. These techniques encompass host-based intrusion detection
David Schubert   +2 more
doaj   +1 more source

Detecting Software Security Vulnerabilities Via Requirements Dependency Analysis

open access: yesIEEE Transactions on Software Engineering, 2022
Cyber attacks targeting software applications have a tremendous impact on our daily life. For example, attackers have utilized vulnerabilities of web applications to steal and gain unauthorized use of sensitive data stored in these systems.
Wentao Wang   +3 more
semanticscholar   +1 more source

Analysis of identifiers in IoT platforms

open access: yesDigital Communications and Networks, 2020
The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind of operation. Many organizations and standard bodies
Haris Aftab   +5 more
doaj   +1 more source

Security and Independence of Process Safety and Control Systems in the Petroleum Industry

open access: yesJournal of Cybersecurity and Privacy, 2022
The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry.
Tor Onshus   +8 more
doaj   +1 more source

Analyzing the Data of Software Security Life-Span: Quantum Computing Era

open access: yesIntelligent Automation and Soft Computing, 2022
Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of ...
Hashem Alyami   +7 more
semanticscholar   +1 more source

The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective

open access: yesApplied Sciences, 2021
The primary goal of this research study, in the field of information technology (IT), is to improve the security and durability of software. A quantum computing-based security algorithm springs quite a lot of symmetrical approaches and procedures to ...
Hashem Alyami   +7 more
semanticscholar   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +3 more sources

Home - About - Disclaimer - Privacy